Get In Touch
Do you remember when Cyber Monday wasn't a thing? In late November 2005, The New York Times reported: "The name Cyber Monday grew out of the observation that millions of otherwise productive working Americans, fresh off a Thanksgiving weekend of window shopping, were returning to high-speed Internet connections at work Monday and buying what they liked." At that time, internet connections in most homes were slow.
Since mid-August, a variety of threat actors (and copycats alike) have been targeting organizations across all industries globally, threatening impending DDoS attacks unless Bitcoin is paid out. It's apparent, as the campaign rages on, that some businesses must be paying the extortion demands, -- incentivizing the criminal activity. Others are procuring emergency DDoS defenses in order to withstand bandwidth-busting attacks and keep internet-facing infrastructure protected. As highlighted in our last
One Small Step for DNS, One Giant Leap for the Internet Human nature is to seek simpler and convenient ways to do things. One example is the sometimes onerous task of typing a URL into a web browser's address bar. Since users prefer short, easy-to-remember URLs, an internet trend is to use short domains for websites (e.g., edgedns.zone). With short website names, users benefit from the convenience of fewer characters
A new skimmer attack was discovered this week, targeting various online e-commerce sites built with different frameworks. As of the writing of this blog post, the attack is still active and exfiltrating data.
The Open Web Application Security Project (OWASP) Foundation defines script attacks as a "type of injection in which malicious scripts are injected into otherwise benign and trusted websites."1 From the perspective of the user, malicious code is coming from trusted websites. Recently popularized by Magecart hacker groups, script attacks have focused on the web skimming of cookies, tokens, and -- most commonly -- personally identifiable information (PII) such as payment
Challenges of Bot Detection: Keeping Defenses High Without Triggering False Positives Identifying bots is important and complicated work. Keeping up with ever-changing bot technologies and attack strategies requires deep knowledge and continuous threat research. The outbreak of the COVID-19 pandemic -- already threatening to throw everything off track -- hasn't made it any easier. Consumers are changing their online behavior in radical ways, and cybercriminals are paying attention. Bot attacks
Costarring Susan McReynolds and Tom Emmons As you might imagine, as the go-to enterprise DDoS mitigation experts, our phones have been "ringing off the hook" as the global extortion DDoS campaign sequel rages on. It's bigger, badder, and features a broader cast of criminal characters than seen previously with last year's extortion-related activity.
While the world fights against the COVID-19 pandemic, cybercriminals are out in full force with a multitude of scams designed to take advantage of the confusion and panic. COVID-19 has -- by necessity -- made us all more comfortable working, playing, and buying online.
Gartner published its 2020 Magic Quadrant for Web Application Firewalls (WAF)i and named Akamai a Leader for the fourth consecutive year. Gartner's high distinction is market recognition of our completeness of vision and ability to execute.