Akamai Diversity

The Akamai Blog

Akamai

Akamai

March 19, 2015 12:30 PM

A Five-Step Guide for Evaluating Web Performance Opt ...

The experience your customers have while interacting with your company's online presence says so much about your business, its priorities, and your brand. Whether your company conducts online transactions or not, performance optimization have become more of a "need" than a "want". A slow performing web site is bound to have less engagement among critical audiences, lower transaction volume, degraded brand fidelity, and higher bounce rates. In this post, we

Bill Brenner

Bill Brenner

March 17, 2015 2:30 PM

New Vulnerabilities in OpenSSL

Akamai is aware of an announcement from OpenSSL revealing vulnerabilities in the OpenSSL stack. Based on information provided by the OpenSSL team, the high-severity vulnerability only affects OpenSSL v1.0.2. Akamai does not use this version of OpenSSL and is therefore not susceptible to that vulnerability. We continue to investigate, however. The full advisory will be available on March 19. Akamai will have further details about our response plans at that

Bill Brenner

Bill Brenner

March 11, 2015 12:11 PM

Update on Akamai's CVE 2015-0204 Response

Here's an update on Akamai's efforts to address the security vulnerabilities outlined in CVE 2015-0204: As of today -- Wednesday, March 11, 2015 -- we have completed all the necessary change activities. Export Grade Ciphers are now disabled by default on our network.

Bill Brenner

Bill Brenner

March 11, 2015 6:17 AM

Microsoft Fixes FREAK Flaw and More

Microsoft yesterday released its most significant patch update in a long while, fixing the so-called FREAK vulnerability, among other things. In all, 14 security issues were addressed, five of which are tagged as critical. Affected systems include the consumer and server editions of Windows, Internet Explorer, Office, Server and Exchange Server and SharePoint. Akamai addressed the CVE 2015-0204 vulnerability -- which FREAK exploits -- two weeks ago. You can read

Bill Brenner

Bill Brenner

March 11, 2015 5:45 AM

AppSec USA 2015 Call For Papers

Fellow security practitioners: OWASP AppSec USA 2015 will take place in San Francisco Sept 22-25.  The call for papers closes March 14.  It's probably the biggest application security conference of the year, so it's a great speaking opportunity.From the OWASP website: OWASP encourages and prioritizes submissions around the three focus areas of AppSec USA 2015:  Web Application securityDevOpsCloud SecurityIn addition to these focus areas, OWASP is interested in all topics related

Bill Brenner

Bill Brenner

March 10, 2015 5:09 AM

CSIRT Advisory: Mass Website Defacements

The following was written by Akamai CSIRT researcher Patrick Laverty:Akamai has seen multiple media reports where a group will claim to have hacked hundreds or thousands of sites in a single night. The intent is to instill a sense of widespread unease to the casual observer. When we look a little closer, we see that there may be more to it. One can rightly assume that many of these have

Bill Brenner

Bill Brenner

March 3, 2015 5:32 AM

Global Map of DDoS Attacks

Among the security content on Akamai's new State of the Internet website is a very cool map where you can view DDoS attack activity worldwide in near real-time, including global sources, types, volume and targets. The most recent 5000 DDoS attacks blocked by Akamai appear on the map. Each DDoS attack source can command hundreds or thousands of DDoS bots. Viewers can customize their view by zooming in or out.

Bill Brenner

Bill Brenner

March 2, 2015 4:18 PM

Akamai Addresses CVE 2015-0204 Vulnerability

The following, written by Rich Salz, deals with Akamai's response to CVE 2015-0204. The vulnerability has been exploited by such exploits as the so-called FREAK attack. Back in the last century, the United States tried to control the export of strong cryptography. This policy made its way into the SSL/TLS standards in two ways. The first part was to add several cipher suites that used small, easily breakable keys. These

Bill Brenner

Bill Brenner

February 25, 2015 6:25 AM

DDoS Agents Target Joomla, Other SaaS Apps

A new attack threatens enterprises and Software-as-a-Service (SaaS) providers: chaotic actors using Joomla servers with a vulnerable Google Maps plugin installed as a platform to launch DDoS assaults. The attack technique was discovered by researchers from Akamai's Prolexic Security Engineering & Research Team (PLXsert), working alongside PhishLabs' Research, Analysis, and Intelligence Division (R.A.I.D). You can download the full advisory from Akamai's State of the Internet website for free.