Get In Touch
Recently in Web Security Category
It's two weeks until RSA, the biggest security conference of the year. For first-timers, this is the time to start preparing and understanding what lies ahead. It can be an overwhelming experience, with two loud exhibit halls, too many evening events to count on two hands, and so many talks it can be hard to choose what's best for your interests.
To that end, here's some advice for RSA 2015, which takes place April 20-24 at the Moscone Center in San Francisco:
One reader told me the use of booth babes isn't the result of bad intentions. It's just that some marketing teams don't know any better. They assume the booth babes work because they see others using them. I think there's some truth to that.
Welcome to the inaugural episode of Akamai's State of the Internet Security Podcast. This will be an ongoing podcast series where I talk to Akamai security researchers about the threats they are tracking and the defenses they identify.
Episode 1 takes us to a fairly new attack technique that exploits Microsoft's SQL Server Resolution Protocol.
Our research team recently discovered that the bad guys are using a reflection-based tactic to tamper with the Microsoft SQL Server Resolution Protocol and launch DDoS attacks.
Akamai first spotted attackers using the technique in October. But last month an independent researcher studied another such attack and we were able to replicate it by creating a script based on Scapy, an open-source packet manipulation tool.
Joining me to talk about this is Akamai PLXSert Principal Researcher Rod Soto.
Akamai is aware that details are now available for the OpenSSL vulnerabilities we first told you about on Tuesday. The full OpenSSL Security Advisory is available here and outlines 14 different issues.
At this time, most of the issues don't appear to affect Akamai, though we continue to investigate.
One of the high-severity vulnerabilities affects OpenSSL v1.0.2., which Akamai does not yet use.
If our investigation uncovers additional risks, we will use additional blog posts and Luna advisories to update customers on how we are affected and what we're doing about it.
More Akamai perspective on patching and vulnerability management:
The experience your customers have while interacting with your company's online presence says so much about your business, its priorities, and your brand. Whether your company conducts online transactions or not, performance optimization have become more of a "need" than a "want". A slow performing web site is bound to have less engagement among critical audiences, lower transaction volume, degraded brand fidelity, and higher bounce rates. In this post, we will talk about some of the key considerations when evaluating web performance technologies and vendors.
Akamai is aware of an announcement from OpenSSL revealing vulnerabilities in the OpenSSL stack.
Based on information provided by the OpenSSL team, the high-severity vulnerability only affects OpenSSL v1.0.2. Akamai does not use this version of OpenSSL and is therefore not susceptible to that vulnerability. We continue to investigate, however.
The full advisory will be available on March 19. Akamai will have further details about our response plans at that time.
Microsoft yesterday released its most significant patch update in a long while, fixing the so-called FREAK vulnerability, among other things.
In all, 14 security issues were addressed, five of which are tagged as critical. Affected systems include the consumer and server editions of Windows, Internet Explorer, Office, Server and Exchange Server and SharePoint.
Akamai addressed the CVE 2015-0204 vulnerability -- which FREAK exploits -- two weeks ago. You can read about our response here.
Here's the full patch matrix for Microsoft's March 2015 Security Update: