Get In Touch
Researchers have released details of a tool that allows users to discover origin servers. Researchers call it Cloudpiercer, which uses a number of techniques to locate origin servers' IP addresses. The Cloudpiercer tool bundles several previously known methods with some stated new ones to simplify the reconnaissance against targets. It's a reconnaissance tool, not an attack tool. A potential attacker may use similar methods to search for a customer's datacenter
It seems like holiday promotions have already started for many retailers and the promotion timetables are even earlier than last year. On a recent trip through my local big box retailer I noticed that Christmas decorations are already out, just one aisle down from the Halloween decorations.
A pharmaceutical company decides to go global for a lot of reasons: Perhaps they want to expand into developing markets that are less saturated. Or they may need to conduct global clinical trials to get broader and more diverse participant base.
On September 16, 2015 the Securities Industry and Financial Markets Association (SIFMA) conducted Quantum Dawn 3, the third in a series of cyber attack exercises against the capital markets industry. Over 650 people from more than 80 firms and government agencies participated in the exercise. And this year, for the first time, Akamai was invited to take part.
By Bill Brenner, Akamai SIRT Senior Tech WriterAkamai's Security Intelligence Response Team (SIRT) is tracking XOR DDoS, a Trojan malware attackers are using to hijack Linux machines to include within a botnet for distributed denial of service (DDoS) campaigns. To date, the bandwidth of DDoS attacks coming from the XOR DDoS botnet has ranged from a few gigabits per second (Gbps) to 150+ Gbps. The gaming sector is the primary
For app developers who use or are looking to use Akamai application acceleration services, we've provided the following information to help you understand how our services comply with Apple iOS 9 App Transport Security (ATS) requirements. Helpful Links:Apple release notesATS requirement detailsPre-iOS9 app behavior
Written by Bill Brenner, senior tech writer in the Akamai SIRTAkamai has officially launched a new Security Intelligence Response Team that combines the resources of Akamai's CSIRT and Prolexic's PLXsert teams, further integrating Prolexic and Akamai security research.Akamai SIRT is a dedicated group of cyber threat researchers, analysts and incident responders that monitors malicious cyber threats globally and analyzes these attacks using proprietary techniques and equipment. Through research, digital forensics, real
A quick scheduling note ahead of Akamai Edge 2015: I'll be moderating a panel with fellow Akamai security researchers about the various trends we've been tracking in the last 12 months. If you're at Edge, please join us.Security Threat Landscape - A Year in review Description: The more you know about the security threat landscape and the mindset of malicious attackers, the stronger your cloud security strategy defense can be.
Akamai Security Intelligence Response Team (SIRT) researchers Larry Cashdollar and Chad Seaman have spent months researching vulnerabilities in plug-ins often used with Wordpress. The results of that research are outlined in the Q2 State of the Internet Report, and an excerpt on the section can be found in this Akamai Blog post. In the following post, Larry shares some tips for researching Wordpress plug-ins.***By Larry Cashdollar, Senior Security Intelligence Response