The Akamai Blog
Your Cache is Exposed
6 years 8 months ago
On February 28, Akamai recorded a 1.35 Tbps DDoS attack against one of our customers. The attack was driven by a relatively new vector, memcached reflection. Possibly the largest publicly disclosed DDoS attack to date, the memcached attack was more than twice the size of the largest DDoS attacks that were launched against an Akamai customer by the operators of the Mirai botnet in September of 2016.
Chad Seaman
Beware of PerformanceTiming.domInteractive
6 years 11 months ago
Utkarsh Goel
How-To: Replaying Cellular Network Characteristics on Cloud Infrastructure
6 years 11 months ago
Utkarsh Goel
Introduction to DNS Data Exfiltration
7 years 2 months ago
Written by Asaf Nadler and Avi Aminov Updated 2/14/19 After the initial publication of this blog post, Asaf Nadler and Avi Aminov wrote a paper on the detection of malicious and low throughput data exfiltration over the DNS protocol. The...
Asaf Nadler
When Looking for SWIFT Audit Guidelines, Beware of the Customer Security Controls Framework
7 years 2 months ago
Ariel Zeitlin
The WireX Botnet: An Example of Cross-Organizational Cooperation
7 years 2 months ago
On August 17th, 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. The botnet is named for an anagram for one of the delimiter strings in its command and control protocol. The WireX botnet comprises primarily Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.
Akamai InfoSec
How to Build Virtual Python Environment
7 years 5 months ago
In the DevOps world, getting a consistent development environment is crucial. In this post, I'll show you how to set up a virtual Python environment and install the correct libraries to achieve a consistent development environment.
Akshay Ranganath
The Bondnet Army: Questions & Answers
7 years 6 months ago
The following is a select list of questions and answers that we hope will shed more light on the botnet.
Ravit Greitser
What You Need to Know About Caching Video Series
7 years 7 months ago
In this "unofficial" video series, Akamai Solutions Engineers Tedd Smith and CJ Arnesen explain the basics of caching: what it is, why it's important, and how to get the most out of it. A great introduction to Akamai, caching, and content delivery network (CDN) basics, this series supplements Akamai Quick Starts and User Guides to help you level set new team members and other departments within your organization.
Mario Korf
SambaCry, the Seven Year Old Samba Vulnerability, is the Next Big Threat (for now)
7 years 8 months ago
As Samba is used as part of many organizations storage systems, we will discuss the impact of the vulnerability on organizations and home users.
Daniel Goldberg
0.2 BTC Strikes Back, Now Attacking MySQL Databases
7 years 9 months ago
In this post we will describe how GGSN detected a wide ransomware attack targeting MySQL databases and provide recommendations on how to protect your database.
Ofri Ziv
17 Essential Skills for Performance Engineers
7 years 10 months ago
Most people in the performance engineering field agree that our skillset is derived from an intersection of disciplines that include testing, optimization, and systems engineering.
Eric Proegler
Convenient Mobile Commerce is the Key to Success this Holiday Season
8 years ago
With the Black Friday, Cyber Monday holiday weekend upon us, retailers in the U.S. and abroad are preparing for another peak period for customer acquisition and commerce revenues. In 2016, the U.S. eCommerce market is the second largest globally and...
Ari Weil
Yes, My Name is ||
8 years ago
Different cultures and nationalities have different naming conventions; I came from a one that led me to face the universe with a personal name "Or". I fact, my name has different meanings in different languages. In English the meaning of "Or" is function word that indicate alternatives and in computer coding languages the name "Or" is being used as Boolean operator that enable us to write conditions in our code.
Or Katz
Planning for the End of 2016: A Leap Second and the End-of-Support for SHA-1 TLS Certificates
8 years ago
A leap second and the final end of browser support for SHA-1 TLS certificates will happen and can potentially break software systems and applications.
Erik Nygren
The PhotoMiner Campaign
8 years 5 months ago
In this report we will share our research on the PhotoMiner?s timelines, infection strategies, C&C servers and provide tools to help detect the malware.
Daniel Goldberg
How to Report Your Performance Test Results Like a Pro
8 years 7 months ago
Performance tests try to reduce the risks of downtime or outages on multi-user systems by conducting experiments that use load to reveal limitations and errors in the system. Testing usually involves assessing the performance and capacity of systems that were expensive and time-consuming to build.
Eric Proegler
Revealing Guardicore Reveal?
8 years 8 months ago
Lior Neudorfer
Redirecting On the Edge
8 years 9 months ago
On the web, every second counts. Service engineers and operations teams are looking for ways to save milliseconds from web pages' load times. One of the simpler ways to squeeze better performance from web pages already using a Content Delivery Network (CDN) is to move the redirection responses from origin to the edge.
Danny Stern
Checked
12 hours 43 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed