The Akamai Blog
Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE
1 year 3 months ago
Ryan Barnett & Sam Tinklenberg
Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE
1 year 3 months ago
Ryan Barnett & Sam Tinklenberg
Cloning Content to Linode Object Storage with RClone
1 year 3 months ago
Stuart Macleod
Living off the VPN — Exploring VPN Post-Exploitation Techniques
1 year 3 months ago
Ori David
Living off the VPN ? Exploring VPN Post-Exploitation Techniques
1 year 3 months ago
Ori David
Akamai Blocked 419 TB of Malicious Traffic in a 24-Hour DDoS Attack
1 year 3 months ago
Sven Dummer
What Is an Event-Driven Microservices Architecture?
1 year 3 months ago
Pavel Despot
It’s a New World: APIs Protected by the Power of N
1 year 4 months ago
The world of APIs is changing fast — as is what it takes to secure them. Our new Power of N campaign explains why.
Stacey Sweeney
PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
1 year 4 months ago
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
Ophir Harpaz
The Nansh0u Campaign – Hackers Arsenal Grows Stronger
1 year 4 months ago
In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three had source IP addresses originating in South-Africa and hosted by VolumeDrive ISP (see IoCs).
Ophir Harpaz & Daniel Goldberg
The Oracle of Delphi Will Steal Your Credentials
1 year 4 months ago
Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.
Daniel Goldberg
Threats Making WAVs - Incident Response to a Cryptomining Attack
1 year 4 months ago
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident response processes in data centers.
Guardicore Labs Team
Keep Your Tech Flame Alive: Trailblazer Rachel Bayley
1 year 4 months ago
In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their authentic selves.
Akamai FLAME Team
Akamai’s Strategic and Transparent Implementation of AI
1 year 4 months ago
Berk Veral
Take Cover: Securing Games Truly Is a Battle Royale
1 year 4 months ago
Tricia Howard
Take Cover: Securing Games Truly Is a Battle Royale
1 year 4 months ago
Tricia Howard
Why (and How) APIs and Web Applications Are Under Siege
1 year 4 months ago
Read a summary of the latest SOTI report, which tackles the security risks in web applications and APIs, and the infrastructure that powers them
Mitch Mayne
Why (and How) APIs and Web Applications Are Under Siege
1 year 4 months ago
Read a summary of the latest SOTI report, which tackles the security risks in web applications and APIs, and the infrastructure that powers them
Mitch Mayne
Keep Your Tech Flame Alive: Akamai Trailblazer Elizabeth Padley
1 year 4 months ago
In this Akamai FLAME Trailblazer blog, Elizabeth Padley tells us that as an international employment lawyer in tech, she has learned to expect the unexpected.
Akamai FLAME Team
Checked
5 hours 16 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed