Akamai Diversity

The Akamai Blog

Bill Brenner

Bill Brenner

April 23, 2015 8:12 AM

DD4BC Operation Profile [Medium Risk]

Update: In an earlier version of this bulletin, we discussed how chaotic actors were exploiting Google services as part of their operations. Some have misconstrued it as Google backing a botnet. To be clear, Google has no part in this activity, and certainly does not condone such activity.DD4BC, a malicious group responsible for several Bitcoin extortion campaigns last year, is expanding its extortion and distributed denial of service (DDoS) campaigns

Bill Brenner

Bill Brenner

April 23, 2015 8:02 AM

Podcast: Live from RSA 2015, Bill Brenner and Jack D ...

State of the Internet Security Podcast Host Bill Brenner catches up with an old friend: Tenable Network Security's Jack Daniel. The two have been friends and industry colleagues for the last decade, having spent many a security conference in the trenches together. For travel to and from one such event, they shared a cramped RV from Boston to Washington, DC three years in a row. Some things have changed in

Bill Brenner

Bill Brenner

April 22, 2015 9:49 AM

Q1 2015 SOTI Preview: Significance of a 100 GBPS Att ...

The Q1 2015 State of the Internet - Security Report is due out next month, and we think the week of RSA Conference 2015 is a good time to start previewing sections.Yesterday we reviewed the continuing trend of website defacements and DNS Hijacking. The day before that we reviewed the potential security risks of widespread IPv6 adoption. Today, we look at the significance of a 100 GBPS attack.

Bill Brenner

Bill Brenner

April 21, 2015 3:53 PM

Akamai's Response to CVE-2015-1635

In response to the vulnerability discussed in the Microsoft disclosure at https://technet.microsoft.com/library/security/MS15-034, Akamai has analyzed its production servers and has determined it is not running any version of the software that is susceptible to the vulnerability. Akamai has created a permanent rule for the Trustwave® ModSecurity® Core Rule Set (CRS) and Akamai® Kona Rule Set (KRS) rule to help protect customer servers from attacks that exploit this vulnerability. This rule (3000031)

Akamai

Akamai

April 21, 2015 9:58 AM

Proactive web security with client reputational serv ...

In 2014, several successful malicious attacks against large financial services, government and private sector firms gave a clear indication of the changes occurring in the network security industry. The recent Ponemon Institute Cost of a Data Breach study found the average cost of a data breach to be $3.5 million with average cost per compromised record more than $145. (1) Akamai's State of the Internet Report for Security, Q4, 2014,

Bill Brenner

Bill Brenner

April 21, 2015 7:36 AM

State of the Internet Security Podcast, Episode 2: L ...

Andrew Hay, BSidesSF volunteer and research director at OpenDNS, talks to Bill Brenner about the major security issues being discussed at this year's two-day BSides event, as well as problems with attack attribution, potential fearmongering and what we might expect at RSA. Hear the entire episode here

Bill Brenner

Bill Brenner

April 20, 2015 10:45 PM

Q1 2015 SOTI Preview: Website Defacements and DNS Hi ...

The Q1 2015 State of the Internet - Security Report is due out next month, and we think the week of RSA Conference 2015 is a good time to start previewing sections. Yesterday we reviewed the potential security risks of widespread IPv6 adoption. Today, we look at the continuing trend of website defacements and DNS Hijacking.

Bill Brenner

Bill Brenner

April 20, 2015 8:16 AM

Q1 2015 SOTI Preview: IPv6 Security Challenges

The Q1 2015 State of the Internet - Security Report is due out next month, and we think the week of RSA Conference 2015 is a good time to start previewing sections.Let's begin with the potential security risks of widespread IPv6 adoption.

Bill Brenner

Bill Brenner

April 16, 2015 3:58 AM

An Evening With Akamai and AT&T During #RSAC 2015

As RSA Conference 2015 attendees continue to finalize evening schedules, here's a suggestion: Come by our event with AT&T. Meet and mingle with Akamai, AT&T and your fellow security professionals. Enjoy libations and hors d'oeuvres. Location: The Burritt Room, Mystic Hotel Date & Time: Wednesday, April 22 7:30-10:30 p.m. Register today to attend this invitation-only reception at Burritt Room in the historic Mystic Hotel just North of Union Square in