The Akamai Blog
Latest ECHOBOT: 26 Infection Vectors
6 years 10 months ago
Introduction Since the release of the Mirai source code in October of 2016, there have been hundreds of variants. While publishing my own research, I noticed that Palo Alto Networks was also examining similar samples, and published their findings. Earlier...
Larry Cashdollar
Catch Me If You Can: Evasive and Defensive Techniques in Phishing
6 years 10 months ago
Phishing is a multifaceted type of attack, aimed at collecting usernames and passwords, personal information, or sometimes both. Yet, these attacks only work so long as the phishing kit itself remains hidden. Phishing is a numbers game and time is...
Or Katz
In Conversation: New Starters
6 years 10 months ago
The world is changing. At Akamai, we're proud to be part of the shift towards a more inclusive future. Where digital systems may replace human processes, we are determined to keep people at the center of our focus. After all,...
Akamai
Identifying Vulnerabilities in Phishing Kits
6 years 10 months ago
While recently examining hundreds of phishing kits for ongoing research, Akamai discovered something interesting - several of the kits included basic vulnerabilities due to flimsy construction or reliance on outdated open source code. Considering the impact phishing kits have on...
Larry Cashdollar
Our Ceiling, Their Floor, Educating the Future
6 years 10 months ago
Throughout this blog series, we've been discussing the future of tech in relation to our young people. At Akamai, our outreach programs and forward-thinking culture have positioned us as part of the movement determined to make the world better for...
Akamai
16Shop: Commercial Phishing Kit Has A Hidden Backdoor
6 years 10 months ago
Additional research by Or Katz When it comes to targeting Apple users and their personal and financial data, 16Shop has emerged as a go to kit for those who can afford it. While 16Shop is sold to criminals looking to...
Amiram Cohen
Preventing the Top Data Center Breaches
6 years 10 months ago
Data center breaches can seem impossible to avoid, but good data center security can seriously reduce your risk. We look at famous breaches Equifax, Yahoo, & more.
Dave Klein
Bots Tampering with TLS to Avoid Detection
6 years 10 months ago
Researchers at Akamai observed attackers using a novel approach for evading detection. This new technique - which we call Cipher Stunting - has become a growing threat, with its roots tracing back to early-2018. By using advanced methods, attackers are...
Security Intelligence Response Team
Containers vs Virtual Machines – Your Cheat Sheet to Know the Differences
6 years 10 months ago
Containers vs virtual machines is an ongoing debate in many IT shops around the world. Learn what makes each unique, their common use cases, and how to keep both secure.
Igor Livshitz
Words of Wisdom: Advice for Pursuing a Career in Tech
6 years 11 months ago
The introduction of AI into the workplace is creating uncertainty over the future of employment. However, research shows that tech will create "133 million" more jobs before 2022 than it will dissolve, as "new entities in the economy replace obsolete...
Akamai
Deployment Diversity for DNS Resiliency
6 years 11 months ago
Similar to diverse workforces performing at a higher level, diverse network service deployments perform at a higher level that is increasingly important as the Internet continues to augment our reality. Akamai has 20 years of edge service deployment experience. Akamai's Intelligent Edge has proven that the "edge" requires more than "servers" on the edge. Fast, intelligent, and secure edge services require a mix of approaches, principles, and designs that start with DNS in mind.
Jim Gilbert
The Problem with Perfection: Tech Confidence in Young Girls
6 years 11 months ago
At Akamai, we believe the future of tech is full of amazing opportunities. However, to ensure these opportunities are fulfilled, some things in the industry need to change. To enable these changes, we are committed to providing opportunities to anyone...
Akamai
The Leaders of the Future: Tech for Growing Minds
7 years ago
Jobs in the STEM and Tech fields are growing at "three times the pace of non-STEM jobs." The rise of technological advances means the tech industry is not slowing down anytime soon. In the next decade, there will be 1...
Akamai
The AWS Cloud Security Issues You Don’t Want to Ignore
7 years ago
AWS is the biggest name in IaaS, but the shared responsibility model leaves you open to risk. A full approach to AWS cloud security can fill the gap.
Avishag Daniely
Introducing Guardicore Cyber Threat Intelligence
7 years ago
Introducing Cyber Threat Intelligence (CTI), a freely available resource to assist in identifying and investigating malicious IP addresses and domains.
Daniel Goldberg & Ravit Greitser
Guardicore Threat Intelligence Helps Cybersecurity Community Research Attacks and Mitigate Risks
7 years ago
This post discusses how Guardicore Labs helps Guardicore customers and the security community enhance their security posture.
Akamai
Introducing Ability Purge Cache Tag
7 years ago
The new purge by cache tag functionality in Akamai’s Fast Purge is now available to all Akamai content delivery product customers. To get to this point, we went through an exciting, year-long beta with more than 200 participants purging ~200,000,000 tags. During this time, we noted some fascinating (and surprising) ways that customers leveraged tags in their caching strategy -- we’ll share our six favorite here.
Sid Phadkar
5 Docker Security Best Practices to Avoid Breaches
7 years ago
Like with any technology, Docker too has its security concerns. Learn the Docker security best practices that will help keep your infrastructure and applications secure.
Igor Livshitz
Akamai in the Community: Making Tech Accessible
7 years ago
Here at Akamai, we believe every person is important, and that no one should be left out. Our internal culture is cultivated by looking outwards, into the community, to make the life of our society better. Not only do we...
Akamai
Checked
11 hours 58 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed