Akamai Diversity

The Akamai Blog

Shantanu Kedar

Shantanu Kedar

July 17, 2017 8:23 AM

Superior and safe user experiences with the Akamai C ...

Your customers are unique and they all expect fast, secure, personalized digital experiences. They are spread across the world, in regions of varying network connectivity, utilize a plethora of devices and screen sizes - making it challenging to deliver your experiences. By delivering 95 Exabytes of data over billions of devices every year, Akamai provides the world's largest and most trusted cloud delivery platform that empowers you to provide fast,

Martin McKeay

Martin McKeay

June 27, 2017 2:28 PM

Dealing with Petya

Akamai is aware of and is tracking the malware threat known as "Petya". Petya is ransomware spread using several methods, including PSexec, Windows Management Instrumentation Command-line (WMIC), and the EternalBlue exploit used by the WannaCry family of ransomware. The malware spreads via port 139 and 445; it probes IP addresses on the local subnet for vulnerable systems.

Lorenz Jakober

Lorenz Jakober

June 27, 2017 7:10 AM

Akamai Launches New Solution to Help Enterprise Secu ...

Today, we are proud to introduce Akamai Enterprise Threat Protector (ETP). ETP is designed to provide customers quick-to-deploy and easy-to-manage cloud-based protection against the impact of complex, targeted threats such malware, ransomware, phishing, and DNS‑based data exfiltration. One organization already seeing the benefit of using Enterprise Threat Protector is innovator in cruise travel, Norwegian Cruise Line. According to Fidel Perez, the company's Director of Enterprise Architecture and Performance, "An important

Akamai

Akamai

June 5, 2017 12:12 PM

Passive HTTP2 Client Fingerprinting - White Paper

HTTP2 is the second major version of the HTTP protocol. It changes the way HTTP is transferred "on the wire" by introducing a full binary protocol, made up of TCP connections, streams and frames, rather than simply being a plain-text protocol. Such a fundamental change between HTTP/1.x to HTTP/2, meant that client side and server side implementations had to incorporate completely new code to support new HTTP2 features - this

Or Katz

Or Katz

May 25, 2017 10:11 AM

Consuming Cyber-security: The Beginning of a New Era

Overview Can you imagine anyone buying a car without airbags and without seat belts? I bet you can't! So why is it that we buy computers without Antivirus software already installed, home routers without a firewall already installed or connected devices (IoT) that are lacking proper security controls?

Avi Aminov

Avi Aminov

May 24, 2017 9:19 AM

Spotlight on Malware DGA Communication Technique

Written by Avi Aminov and Or Katz Overview Imagine you are standing in the middle of a crowded train station and want to have a private conversation with an old friend. You've been waiting for the perfect time to contact him and get some advice on how to move forward with some important life choices. But you couldn't wait any longer, and now you're on a train platform. There are

Akamai SIRT Alerts

Akamai SIRT Alerts

May 15, 2017 1:35 PM

WannaCry: What We Know

On Friday, May 12, news agencies around the world reported that a new ransomware threat was spreading rapidly. Akamai's incident response teams and researchers worked quickly to understand this new threat and how to mitigate it. This blog post is a summary of what Akamai knows at this point. Remember that this is still an evolving threat and this information may change. Akamai will update this post as we collect

Meg Grady-Troia

Meg Grady-Troia

May 11, 2017 3:12 PM

DDoS Attacks against DNS Infrastructure in the News

DNS-based DDoS attacks have gained mindshare among Akamai customers lately, most recently with last year's Dyn attacks (written about on the Akamai Blog here and here) and this week's attack against Cedexis. DNS infrastructure is a ripe target for malicious actors hoping to disrupt a digital property's availability because it provides the initial resolution for an end user's browser client from hostname to IP address. At best, an attack against

Meg Grady-Troia

Meg Grady-Troia

April 28, 2017 12:17 PM

Low Risk Threat: DDoS Extortion Letters

Summary Adversaries calling themselves the Lizard Squad have been sending businesses extortion letters, demanding payment in bitcoin to prevent a Distributed Denial of Service (DDoS) or other attack against their applications. These letters have been sent to businesses across the globe and across industries for several years, with little follow-through. These letters appear to come from multiple groups including Lizard Squad, the Armada Collective, and DD4BC, though in many case