Get In Touch
While this year's Super Bowl XLIX pitted two powerhouse teams from Seattle and Boston squarely against one another, behind the scenes two other notable Seattle and Boston organizations worked closely to help ensure viewers could enjoy the game live online. The Super Bowl is just one of many of the major online events upon which
Microsoft and Akamai have collaborated, with others including the Sochi Winter Olympics and Brazil World Cup.
By Bill Brenner, Akamai SIRT Senior Tech Writer
Akamai's Security Intelligence Response Team (SIRT) is tracking XOR DDoS, a Trojan malware attackers are using to hijack Linux machines to include within a botnet for distributed denial of service (DDoS) campaigns. To date, the bandwidth of DDoS attacks coming from the XOR DDoS botnet has ranged from a few gigabits per second (Gbps) to 150+ Gbps. The gaming sector is the primary target, followed by educational institutions. Akamai SIRT released a threat advisory this morning authored by Security Response Engineer Tsvetelin "Vincent" Choranov.
For app developers who use or are looking to use Akamai application acceleration services, we've provided the following information to help you understand how our services comply with Apple iOS 9 App Transport Security (ATS) requirements.
In this episode, Bill Brenner, Martin McKeay and Dave Lewis discuss DEF CON 2015 in terms of content and substance. One of the hot-button topics discussed at DEF CON and other security events is the hacking of IOT devices, including smart cars, and the group analyzes the research necessary into possible vulnerabilities. The trio also discusses changes for the State of the Internet Security Report, beginning in Q3 2015, including reorganization of case studies and the inclusion of new data and new voices to represent different aspects of security.
The DNS offers visibility into many kinds of Internet trends including various security threats. We've reported extensively on DNS DDoS and Nominum, now part of Akamai, Data Science also tracks botnet activity. In this case queries for Command and Control (C&C) domains for the recently disclosed XcodeGhost malware were observed in September. Infected development tools were reported to have been used for the popular iOS app WeChat.
Over the last several years, many users have adopted mobile devices, including smartphones and tablets, as their primary means of accessing the Internet. A number of studies published over the past year illustrate this trend, especially among millennials. In addition, improvements to, and greater deployment of this technology by mobile network providers have led to mobile connection speeds that rival fixed broadband connections in some geographies. LTE-Advanced, which is being rolled out by carriers in countries around the world, provides for download speeds in the hundreds of Mbps range, with the latest Android and Apple devices including support for LTE-Advanced.
Written by Bill Brenner, senior tech writer in the Akamai SIRT
Akamai has officially launched a new Security Intelligence Response Team that combines the resources of Akamai's CSIRT and Prolexic's PLXsert teams, further integrating Prolexic and Akamai security research.
Akamai SIRT is a dedicated group of cyber threat researchers, analysts and incident responders that monitors malicious cyber threats globally and analyzes these attacks using proprietary techniques and equipment.
Through research, digital forensics, real time and post-event analysis, Akamai SIRT is able to build a global view of security threats, vulnerabilities, tactics, techniques and procedures (TTPs) as well as trends which are shared with customers and the security community. This further enables Akamai to protect customers from a wide variety of attacks ranging from abuse to scrapers to data breaches to hijacking to distributed denial of service. By identifying the sources and associated attributes of individual attacks, along with expert analysis to identify and mitigate security threats and vulnerabilities, Akamai SIRT helps organizations make more informed, proactive decisions.
As part of that mission, Akamai SIRT maintains close contact with peer organizations around the world, trains Akamai's security teams to recognize and counter attacks from a wide range of adversaries, acts as subject matter experts for customers under attack, and keeps customers and the security community informed by conducting briefings, issuing advisories, publishing threat intelligence, and producing Akamai's State of the Internet Security Report.
The Akamai SIRT protects customers and the broader public by applying security research, intelligence analysis, and Akamai's unique visibility into Internet threats.
Akamai SIRT publishes its research in the following places: