The Akamai Blog
Negative Exposure: Edimax Network Cameras Used to Spread Mirai
1 year ago
Mirai continues to plague organizations. Read how the Akamai SIRT identified a new command injection vulnerability that’s targeting Edimax devices.
Kyle Lefton & Larry Cashdollar
Detecting and Mitigating the Apache Camel Vulnerabilities
1 year ago
Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891.
Akamai Security Intelligence Group
From Good to Great: Mastering Day-2 Network Security Policy
1 year ago
Zohar Furman
Behind the Scenes: Introducing the Akamai Design System
1 year ago
We recently made some design changes to our UI to improve the user experience. Lead Senior Software Engineer Jaalah Ramos expands on the “why” in this Q&A.
Maddie Presland
Magecart: How Akamai Protected a Global Retailer Against a Live Attack
1 year 1 month ago
Gal Meiri
Scale Transcoding and AI Workloads with GPU Kubernetes Clusters
1 year 1 month ago
Hana Jeddy
Mastering Kubernetes: From Troubleshooting to Simplicity
1 year 1 month ago
Billy Thompson
Why Are Airlines a Prime Target for Cyberattacks?
1 year 1 month ago
Jim Black & Eric Rubenov
Lightning-Fast Requests with Early Data
1 year 1 month ago
Robin Marx & Rafal Myszka
Strengthening Our Emissions Accounting Process
1 year 1 month ago
Margot Hines
PCI DSS v4.0.1: The Changes You Need to Know to Qualify for SAQ A
1 year 1 month ago
What's changed in PCI DSS v4.0.1? Get a breakdown of what these new requirements mean and how Akamai’s solutions can help.
Mark Carrizosa , Boris Kirzner & Emily Lyons
Zero Trust Network Access Without the Performance Penalty
1 year 1 month ago
Jim Black
DevOpsDays 2025
1 year 1 month ago
Billy Thompson
Abusing VBS Enclaves to Create Evasive Malware
1 year 1 month ago
Ori David
Abusing VBS Enclaves to Create Evasive Malware
1 year 1 month ago
Ori David
Accelerate Your Business Success with Akamai Enhanced Partner Portal
1 year 1 month ago
Marcello Scippa
Deepseek: Why it Matters and What the Press Got Wrong
1 year 1 month ago
Robert Blumofe
How to Recognize AI Attacks and Strategies for Securing Your AI Applications
1 year 1 month ago
Ziv Eli & Gal Meiri
Protect Your Critical Assets with Akamai Guardicore DNS Firewall
1 year 1 month ago
Enhance your network security and protect servers, workloads, and IoT devices with Akamai Guardicore DNS Firewall.
Jim Black
Checked
6 hours 22 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed