Get In Touch
By Clark Shishido, Akamai SIRT Security Response EngineerApplications written in Java commonly use a call-in function from a widely deployed library to decode data passed between computers. The call is java.io.ObjectInputStream.readObject from Apache commons-collection. An attacker can append arbitrary data to a base64 encoded serial data stream, which will then be deserialized when the data is read into a Java application. By appending malicious payloads to the stream, the attacker can
By Meg Grady-Troia and Bill BrennerAs we move toward 2016, browser developers have moved to retire the SHA-1 cryptographic hash algorithm in favor of SHA-2. Browsers are beginning to show warnings or errors for HTTPS connections made to servers presenting certificate chains signed using SHA-1.Companies like Google, Mozilla, Microsoft and the CAB/Browser Forum have released their own descriptions of how they're managing the process. This post describes the Akamai-compatible workflow
By Bill Brenner, Akamai SIRT Senior Tech WriterAkamai's Security Intelligence Research Team (SIRT) released a new whitepaper this morning about the rising risks medical organizations face as they become increasingly dependent on digitized record keeping.The use of Electronic Medical Records (EMRs) and a more digitally integrated medical records system is no longer science fiction, and the task of securing sensitive medical data is a daunting challenge. The threat landscape continues
By Bill Brenner, Akamai SIRT Senior Tech WriterXor, a Trojan malware attackers are using to hijack Linux machines to include within a botnet for distributed denial of service (DDoS) campaigns, appears to be behind an Oct. 13 attack against a customer using Akamai's FastDNS infrastructure.
It has been a busy week for Akamai and the Cloud Networking team. In addition to launching our Cloud Networking solution category, we completed Edge, our annual customer conference, acquired Bloxx, a Secure Web Gateway company, and Orange Business Services and Deutsche Telekom announced that they selected Akamai Cloud Networking to power their business grade Internet solutions. So what does this mean for our customers?
We are happy to announce that Deutsche Telekom has selected Akamai Cloud Networking to enhance its IP-VPN portfolio. The new IP-VPN offering from Deutsche Telekom will utilize Akamai Cloud Networking Internet Transport Optimization capabilities to bolster the reliability and performance of enterprises' Internet IP-VPN traffic.
If you are a FinTech junkie like myself, you review dozens or articles each week from around the world to try to keep up with the latest hot news and hot companies in this space. Many of the articles highlight recent startups, or report on the investments banks are making in specific companies or their own innovation centers to keep pace with this hot sector. It's all very exciting, but
By Bill Brenner, Akamai SIRT Senior Tech WriterIn recent weeks, Akamai's Security Intelligence Research Team (SIRT) has investigated several DDoS attack campaigns targeting Akamai customers. The group responsible for these attacks calls itself "Armada Collective." Its tactics are similar to those used by the group DD4BC, where they threaten the victim with emails warning of an impending DDoS against their website unless a ransom is paid in Bitcoins.
It's never too early to prepare when you're a retailer gearing up for the holiday rush, especially with the continued growth in online commerce. Now is usually the time that shoppers begin making their shopping plans, and even start to make purchases. To help prepare, we've pulled together three essential elements for providing an exceptional customer experience during the holidays, and ultimately converting shoppers into buyers!