Akamai Diversity

The Akamai Blog

Akamai SIRT Alerts

Akamai SIRT Alerts

June 2, 2016 10:00 AM

Q1 2016 SOTI Security Preview: Reflection DDoS Attac ...

By Akamai SIRT Two quarters ago, we introduced Sankey diagrams to the State of the Internet: Security Report. Sankey graphs help visualize energy, material, or cost transfers between processes. The Sankey graph below shows how DDoS reflection attacks have trended during the past five quarters. We tracked ten infrastructure-layer DDoS-reflection vectors. The most used vectors seem to correlate with the number of Internet devices that use these specific service protocols

Akamai SIRT Alerts

Akamai SIRT Alerts

June 1, 2016 10:00 AM

New DDoS Reflection/Amplification Method Exploits TF ...

Akamai SIRT is investigating a new DDoS reflection and amplification method that abuses TFTP. This is yet another UDP-based protocol that has been added to the list of DDoS amplification scripts available for malicious use. A new advisory authored by Jose Arteaga outlining the threat and suggested defenses can be downloaded here.

Akamai

Akamai

May 26, 2016 12:12 PM

Client Reputation Monitoring: A Proactive Defense Ag ...

Recently, Dan Shugrue, one of our product marketing directors at Akamai was published in InfoSecurity magazine. His article, Barbarians at the Gate - Shoring Up Web Application Defenses with Client Reputation takes an incisive look at how client reputation monitoring can help bolster web security efforts. Dan argues that as attacks evolve, companies doing business on the web (and who isn't these days)must evolve their strategies for identifying and defending

Akamai

Akamai

May 26, 2016 9:27 AM

Machine Learning in Security

I recently started studying for the GMAT and ran into an interesting passage while taking a diagnostic test - a reading comprehension argument by the philosopher John Searle, who was one of the first philosophers to challenge the idea of artificial intelligence. Searle argued that the human brain is not like a computer processor, and that computers are syntactic (rule based), rather than semantic (meaning based) creatures. The diagnostic test

Viktoriya Reyzelman

Viktoriya Reyzelman

May 24, 2016 12:37 PM

Bot Management Strategy

It was March 13th, 2:30 AM at night and the customer called everyone on the Akamai account team announcing they were being attacked. The attacker was locking inventory on their site for hours causing a significant burst in traffic and preventing customers from making transactions. The Akamai Security Operations Center was involved right away and quickly discovered that a bot was behind this attack. This was a "good bot" just

Akamai SIRT Alerts

Akamai SIRT Alerts

May 19, 2016 8:00 AM

Q1 2016 SOTI Security Report: Retail Takes Brunt of ...

By Bill Brenner, Senior Tech Writer, Akamai SIRT Retail was hit hard in Q1 2016 by malicious actors who targeted the business sector with web application attacks. That is among the findings in the State of the Internet Security Report for the first quarter of the year.

Akamai SIRT Alerts

Akamai SIRT Alerts

May 5, 2016 6:59 AM

Why Companies Shouldn't Pay Ransom to Lizard Squad ( ...

By Mike Kun, Manager, Akamai SIRT Extortion attacks have risen since DD4BC kicked things off last year. DD4BC peaked in July and the Armada Collective took over after that, sending out emails threatening attacks unless the victim(s) made ransom payments in bitcoins. The most recent round involved many ransom demand letters, but, as far as many observers can tell, very little follow through. Now we have Lizard Squad, or at

Akamai

Akamai

May 3, 2016 9:15 AM

Defend Against Web Application Account Takeovers

Akamai Security Researcher Or Katz was recently published at InfoSecurity talking about how to defend against web application account takeovers with cloud security intelligence.

Akamai

Akamai

April 26, 2016 8:59 AM

Community, Convenience, and the Claviger

One of the most common complaints on the Akamai Community is from people who are browsing the web from IP addresses that Akamai has seen performing malicious activity. Depending on the severity and number of these malicious activities, Akamai assigns the IP address a rating that predicts the likelihood that the IP will perform a malicious act in the future. These ratings come from our Client Reputation module, a module