The Akamai Blog
Discover and Announce: A Serverless Location Application Built on Akamai IoT Edge Connect
3 years 3 months ago
Learn about Discover and Announce, a 100% serverless application built on Akamai IoT Edge Connect, which can run entirely on the Akamai edge.
Brian Apley
A Log4j Retrospective Part 2: Data Exfiltration and Remote Code Execution Exploits
3 years 3 months ago
Akamai CTO Charlie Gero shows how the Log4j threat surface could extend to unpatchable embedded and IoT devices.
Charlie Gero
Secure Your Kubernetes Clusters to Stop Ransomware
3 years 3 months ago
While containers offer speed and flexibility that have not been possible before in the data center, they are also exposed to security threats such as ransomware, cryptomining, and botnets.
Ravit Greitser & Yuval Goldberg
A Log4j Retrospective Part 1: Vulnerability Background
3 years 3 months ago
Learn about the widely used Java-based logging library Log4j and how its vulnerability and other capabilities presented a major opportunity to attackers.
Charlie Gero
Abuse and Fraud Prevention's Co-Created Future ? Predictions for 2022 and Beyond
3 years 3 months ago
Explore some of the Akamai Abuse and Fraud Prevention team?s predictions for the future of abuse and fraud protection in 2022 and beyond.
Christine Ferrusi Ross
The Great Christmas Download
3 years 3 months ago
Video game downloads and console updates helped game industry traffic peak at 125% above average on Christmas day according to Akamai, which supports more than 225 game publishers globally.
Chris Nicholson
Keeping Up with the Botnets
3 years 3 months ago
It?s no secret that the global pandemic increased opportunities for threat actors and cybercriminals to target financial services. Throughout 2020, scammers used the economic tension caused by COVID-19 ? the promise of financial assistance, the stress of financial hardship ? to target people across the globe via phishing attacks.
Gerhard Giese
Our Journey to Detect Log4j-Vulnerable Machines
3 years 3 months ago
Log4Shell (CVE-2021-44228) is a remote code execution (RCE) vulnerability in the Apache-foundation open-source logging library Log4j. It was published on December 9, 2021, and then all hell broke loose. As Log4j is a common logging library for Java applications, it is highly widespread.
Stiv Kupchik
The Everyday Impacts of Diversity and Inclusion at Akamai
3 years 4 months ago
To me, Diversity & Inclusion means a new way of thinking and engaging with society. It seems to be one of the most popular phrases that every person sees on the internet every day. I have been appointed as an ambassador of D&I for Akamai?s Asia-Pacific Japan region, and have been learning the essential principles along with some of my colleagues for the past several months.
Hisashi Yamaguchi
Why I?m Proud to Protect Billions of People Worldwide
3 years 4 months ago
I decided to pursue a career in IT after working as a support engineer for internal employees as part of my very first job. It immediately opened my eyes to something that I found as interesting as I did shocking: Lots of people don?t understand information security ? and what?s more, they don?t protect their personal data.
Jessie Park
Quantifying Log4Shell: Vulnerability on a Massive Scale
3 years 4 months ago
The Log4Shell vulnerability is here to stay. There is a lot of speculation about the scope and true impact of the vulnerability: While many have labeled it ?severe,? information is limited on how widespread the risk is. In order to shed some light on the issue, Akamai Threat Labs is utilizing its visibility into numerous data centers worldwide to assess the actual risk Log4Shell poses to organizations.
Akamai Security Intelligence Group
How to Get Started With Application Security
3 years 4 months ago
With a comprehensive security stack, Akamai?s application security solutions defend your entire ecosystem from threats. But before you can reap the benefits that come with application security, you need to create a configuration with Akamai?s APIs. Our Developer Advocacy team is here to walk you through the process so you can achieve Infrastructure as Code ? or, as we like to call it here, Akamai as Code. Akamai as Code has the ability to support all the DevSecOps practices you know and love, such as automating repetitive tasks and streamlining configurations and workflows, along with reducing manual work and errors.
Mike Elissen
Akamai Reports Another DoS in Log4j2 (CVE-2021-45105): What You Need to Know
3 years 4 months ago
The series of vulnerabilities recently discovered in Log4j2 has shocked the internet. As part of our continuing research, on December 17, Hideki Okamoto from Akamai found and responsibly reported an additional denial-of-service (DoS) vulnerability, which was assigned as CVE-2021-45105.
Akamai Threat Research Team
Threat Intelligence on Log4j CVE: Key Findings and Their Implications
3 years 4 months ago
Continuing with our research into CVE-2021-44228, Akamai has previously written about what the vulnerability is and given recommendations on how to go beyond patching for extra protection. Across the Akamai network, we see traffic from 1.3 billion unique devices daily, with record traffic of 182 Tbps. The threat research team has been investigating this traffic to gain deeper insights into how this vulnerability is being exploited. We want to share more technical findings and what they mean for threat hunters. Here are some implications for defenders and threat hunters to consider
Application Security Threat Research Team
Akamai Recommendations for Log4j Mitigation
3 years 4 months ago
Aparna Rayasam, SVP & GM Application Security, Akamai
Livery Delivers a Seamless Low Latency Streaming Experience with Help from Akamai
3 years 4 months ago
Our new normal has ushered in the advent of hybrid events ? a mix of in-person and virtual events. This has made seamless live streaming with active participation of the audience, both live and remote, more important than ever. Amsterdam-headquartered company Livery is an end-to-end SaaS solution running on the Akamai content distribution network (CDN), which is perfectly suited for interactive sports, interactive learning, and live commerce productions. We?re delighted that they have chosen to work with us to deliver the experience their clients have come to love.
Ina Christova
Magecart Skimmers Are Alive and Well ? Constant Vigilance Is Required
3 years 4 months ago
Magecart skimmers are here to stay, and they?re becoming more sophisticated, more creative, and harder to detect. In this post, we reveal a new skimmer infrastructure that targets ecommerce sites all over the world with advanced methods of detection evasion and obfuscation.
Roman Lvovsky
CVE-2021-44228 - Patching is Recommended for Evolving Zero Day Vulnerability in Apache Log4j that allows remote code execution (RCE)
3 years 4 months ago
Akamai has been monitoring the rapidly evolving developments of CVE-2021-44228. We have been working closely with our customers and internal application teams to mitigate the risks posed by the threat of unauthorized remote code execution. This includes deploying an update to our existing Apache WAF rules to include mitigation for this Zero Day CVE, and updating the Log4j library to version 2.15.0 or later.
Akamai
CVE-2021-44228 - Zero Day Vulnerability in Apache Log4j that allows remote code execution (RCE)
3 years 4 months ago
See how Akamai helped open-source logging library Log4j fight against a critical unauthenticated remote code execution (RCE) vulnerability and reduce customer exposure.
Akamai
Checked
4 hours 59 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed