Akamai Diversity

The Akamai Blog

Bill Brenner

Bill Brenner

October 28, 2013 6:52 AM

Web Shells, Backdoor Trojans and RATs

Akamai's CSIRT team advises companies to check their systems for Web shells, executable code running on a server that gives attackers remote access to a variety of critical functions. Online adversaries can install Web shells by compromising legitimate Web applications on a server, using such tried-and-true techniques as SQL injection, Remote File Inclusion, an unvalidated file upload feature or through a valid user's stolen credentials. Here are the basics of

Bill Brenner

Bill Brenner

October 25, 2013 3:37 AM

A Twitter Chat on Cybercrime Defense

Yesterday, Akamai participated in a Twitter forum on cybercrime as part of National Cyber Security Awareness Month. Participants supplied a ton of great resources, which I think is worth sharing here. What follows are some of the tweets from the conversation. If you want to stay out of the attackers' crosshairs -- or if you're a victim looking for help -- you'll find what follows useful.ESET ‏@ESET13hIf you're a victim, DOJ has

Bill Brenner

Bill Brenner

October 24, 2013 4:57 AM

Video: An Overview of Tokenization & the Credit Card ...

Akamai CSO Andy Ellis gives an overview of tokenization and why it exists, as well as a brief history of the credit card industry.

Bill Brenner

Bill Brenner

October 23, 2013 6:43 AM

Video: Josh Corman on Different Adversary Classes

Akamai Director of Security Intelligence Josh Corman gives an overview of different adversary classes and their motivations.

Bill Brenner

Bill Brenner

October 22, 2013 7:41 AM

IBM, Akamai Team Up in DDoS Fight

As part of a new partnership, IBM will integrate Akamai's Kona Site Defender with IBM's Cloud Security Services portfolio. IBM Security Services General Manager Kris Lovejoy said her company decided to join forces with Akamai because of its track record in protecting customers from DDoS attacks. "Our clients tell us there is a need to strengthen cloud security," Lovejoy said in a statement. "The partnership with Akamai combines a world-class security

Akamai

Akamai

October 21, 2013 10:02 AM

Movin' On Up (The OSI Stack)

For months now, those of us working to protect Akamai's customers have been trumpeting the same theme: in the same way that companies, technology and applications are moving "Up the Stack" to the web layer, attackers have followed. For the first time since the inaugural "State of the Internet Report" was published in Q1 2008, we saw solid statistical proof to date that the threat landscape has changed:  As of

Bill Brenner

Bill Brenner

October 21, 2013 6:36 AM

State of the Internet Report: DDoS Trends, SEA Attac ...

The latest Akamai State of the Internet report analyzes recent DDoS trends and includes a section on something I've written about a lot in recent months -- attacks from the so-called Syrian Electronic Army. DDoS attacks spiked in the second quarter of 2013, with Akamai customers reporting 318 attacks -- a 54 percent increase over the 208 reported in the first quarter. At 134 reported attacks, the Enterprise sector continued to

Bill Brenner

Bill Brenner

October 18, 2013 8:16 AM

Are You a Future Akamai Security Professional?

It's week three of Cyber Security Awareness Month at the U.S. Department of Homeland Security, and the focus is on the future security workforce. Here's what DHS says on its website: As technology continues to evolve and improve, the need to protect against evolving cyber threats also requires improvement and expansion. To meet the growing technological needs of government and industry, the Department of Homeland Security (DHS) is building strong

Bill Brenner

Bill Brenner

October 17, 2013 8:16 AM

Indonesian Attack Traffic Tops List; Port 445 No Lon ...

This week Akamai released its State of the Internet report for the second quarter of 2013, and the security section includes some changes since the last go around. Based on data gathered from the Akamai Intelligent Platform, the report provides insight into key global statistics such as network connectivity and connection speeds, attack traffic, and broadband adoption and availability. One of the things we track is the origin of attack