The Akamai Blog
Akamai’s Perspective on August’s Patch Tuesday 2024
1 year 5 months ago
Akamai Security Intelligence Group
The Noname Security 3.34 Update Includes Major Enhancements
1 year 5 months ago
Stas Neyman
How To Lower Your Live Video Transcoding Costs
1 year 5 months ago
Talia Nassi
Akamai Guardicore Platform: Microsegmentation Just Got a Whole Lot Better
1 year 5 months ago
Akamai introduces new microsegmentation features to the Akamai Guardicore Platform to help organizations further refine their security posture.
Maya Luisan
Defending Against a Login API Brute Force Attack
1 year 5 months ago
Alex Leung
Taking Steps to Prepare for Quantum Advantage
1 year 5 months ago
Rich Salz & Jan Schaumann
Git-Syncing into Trouble: Exploring Command Injection Flaws in Kubernetes
1 year 5 months ago
Tomer Peled
Git-Syncing into Trouble: Exploring Command Injection Flaws in Kubernetes
1 year 5 months ago
Tomer Peled
Gaining Control Over Sky-High Cloud Costs: Our Journey So Far
1 year 5 months ago
Ari Weil
Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE
1 year 5 months ago
Ryan Barnett & Sam Tinklenberg
Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE
1 year 5 months ago
Ryan Barnett & Sam Tinklenberg
Cloning Content to Linode Object Storage with RClone
1 year 5 months ago
Stuart Macleod
Living off the VPN — Exploring VPN Post-Exploitation Techniques
1 year 5 months ago
Ori David
Living off the VPN ? Exploring VPN Post-Exploitation Techniques
1 year 5 months ago
Ori David
Akamai Blocked 419 TB of Malicious Traffic in a 24-Hour DDoS Attack
1 year 5 months ago
Sven Dummer
What Is an Event-Driven Microservices Architecture?
1 year 5 months ago
Pavel Despot
It’s a New World: APIs Protected by the Power of N
1 year 5 months ago
The world of APIs is changing fast — as is what it takes to secure them. Our new Power of N campaign explains why.
Stacey Sweeney
PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
1 year 5 months ago
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
Ophir Harpaz
The Nansh0u Campaign – Hackers Arsenal Grows Stronger
1 year 5 months ago
In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three had source IP addresses originating in South-Africa and hosted by VolumeDrive ISP (see IoCs).
Ophir Harpaz & Daniel Goldberg
Checked
4 hours 33 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed