Get In Touch
By Bill Brenner, Akamai SIRT Senior Tech WriterAkamai's Security Intelligence Response Team (SIRT) released a new advisory today about three new attack vectors digital miscreants have used to target Akamai customers. The main researchers for this advisory were Jose Arteaga and Wilber Mejia.In the third quarter of 2015, Akamai mitigated and analyzed the following vectors:NetBIOS name server reflection DDoSRPC portmap reflection DDoS Sentinel reflection DDoS, which reflects off of licensing
Researchers have released details of a tool that allows users to discover origin servers. Researchers call it Cloudpiercer, which uses a number of techniques to locate origin servers' IP addresses. The Cloudpiercer tool bundles several previously known methods with some stated new ones to simplify the reconnaissance against targets. It's a reconnaissance tool, not an attack tool. A potential attacker may use similar methods to search for a customer's datacenter
It seems like holiday promotions have already started for many retailers and the promotion timetables are even earlier than last year. On a recent trip through my local big box retailer I noticed that Christmas decorations are already out, just one aisle down from the Halloween decorations.
A pharmaceutical company decides to go global for a lot of reasons: Perhaps they want to expand into developing markets that are less saturated. Or they may need to conduct global clinical trials to get broader and more diverse participant base.
On September 16, 2015 the Securities Industry and Financial Markets Association (SIFMA) conducted Quantum Dawn 3, the third in a series of cyber attack exercises against the capital markets industry. Over 650 people from more than 80 firms and government agencies participated in the exercise. And this year, for the first time, Akamai was invited to take part.
By Bill Brenner, Akamai SIRT Senior Tech WriterAkamai's Security Intelligence Response Team (SIRT) is tracking XOR DDoS, a Trojan malware attackers are using to hijack Linux machines to include within a botnet for distributed denial of service (DDoS) campaigns. To date, the bandwidth of DDoS attacks coming from the XOR DDoS botnet has ranged from a few gigabits per second (Gbps) to 150+ Gbps. The gaming sector is the primary
For app developers who use or are looking to use Akamai application acceleration services, we've provided the following information to help you understand how our services comply with Apple iOS 9 App Transport Security (ATS) requirements. Helpful Links:Apple release notesATS requirement detailsPre-iOS9 app behavior
Written by Bill Brenner, senior tech writer in the Akamai SIRTAkamai has officially launched a new Security Intelligence Response Team that combines the resources of Akamai's CSIRT and Prolexic's PLXsert teams, further integrating Prolexic and Akamai security research.Akamai SIRT is a dedicated group of cyber threat researchers, analysts and incident responders that monitors malicious cyber threats globally and analyzes these attacks using proprietary techniques and equipment. Through research, digital forensics, real
A quick scheduling note ahead of Akamai Edge 2015: I'll be moderating a panel with fellow Akamai security researchers about the various trends we've been tracking in the last 12 months. If you're at Edge, please join us.Security Threat Landscape - A Year in review Description: The more you know about the security threat landscape and the mindset of malicious attackers, the stronger your cloud security strategy defense can be.