Akamai Diversity

Akamai Security Intelligence & Threat Research

Jonathan Respeto

Jonathan Respeto

March 20, 2019 7:00 AM

Continuous Training with CTF's

Akamai Engineering Culture Akamai is an environment fueled by the desire to learn and improve. There are open engineering and training courses, wikis, live training sessions, as well as engineer lead lecture series. Most importantly there is a strong culture around continued personal and professional development. The Security Operations Control Center (SOCC), for example, has a continuous training program where team members are given a full day, every week, dedicated

Amanda Fakhreddine

Amanda Fakhreddine

February 27, 2019 6:30 AM

State of the Internet Volume 5, Issue 2

It's the most wonderful time of the security year - it's almost RSA week! If the world is coming together to talk about security next week, we figured we should join the conversation with our latest State of the Internet report. Joining the conversation is a big part of security departments these days, as we move away from being perceived as a "department of no" to really being seen as

Larry Cashdollar

Larry Cashdollar

February 5, 2019 1:58 PM

Phishing Attacks Against Facebook / Google via Googl ...

When it comes to phishing, criminals put a lot of effort into making their attacks look legitimate, while putting pressure on their victims to take action. In today's post, we're going to examine a recent phishing attempt against me personally. This is an interesting attack, as it uses Google Translate, and targets multiple accounts in one go.

Amanda Fakhreddine

Amanda Fakhreddine

January 30, 2019 9:00 AM

State of the Internet, Volume 5, Issue 1

Is it too late to still say "Happy New Year?" We don't think so. We're kicking off 2019 with our first issue of the State of the Internet / Security.

Akamai InfoSec

Akamai InfoSec

January 22, 2019 9:00 AM

InfoSec experiment - Letting the CAT out of the bag

By Lukasz Orzechowski If you work on an Information Security team that gets customer questionnaires, you're likely familiar with Vendor Security Risk Assessment templates. We all care about information safety, and it is natural for our customers to want to check how well we are aligned with what they require internally, or with industry standards. We get a lot of questions and addressing them is our bread and butter. One

Larry Cashdollar

Larry Cashdollar

January 17, 2019 9:00 AM

ThinkPHP Exploit Actively Exploited in the Wild

While investigating the recent Magecart card skimming attacks, I came across a payload I was not familiar with. Further research into it lead me to discover that in December a researcher disclosed a remote command execution vulnerability in ThinkPHP, a web framework by TopThink.

Or Katz

Or Katz

December 14, 2018 8:00 AM

Quiz Phishing: One Scam, 78 Variations

Overview Over the past year, Akamai Enterprise Threat Research team monitored the usage of one particular phishing toolkit in the wild. We previously wrote about this phishing toolkit as "Three Questions Quiz". The "Quiz" toolkit is not new to the threat landscape, as its been used in many phishing campaigns in recent years. Our goal here is to present new insights on the evolution and scale of usage of the

Martin McKeay

Martin McKeay

December 5, 2018 9:31 AM

A Year of Research

As the year draws to a close, our team decided Issue 5 of the State of the Internet report should take a look back at what we've done over the previous 12 months. The State of the Internet Security report is one of the most visible efforts of the research efforts at Akamai, but it is far from the only research we do and is not always the most important

Amiram Cohen

Amiram Cohen

December 5, 2018 8:00 AM

Threat Hunting When the Perimeter is Vague

Are Domains Malicious? The most basic capability of malware is the ability to communicate. Most malware will use the DNS protocol to enable robust communication. Typical malware payloads will use such techniques to download files to the compromised machine, or to communicate with the Command and Control (CnC) servers in order to control activities or exfiltrate data. These days, the defensive perimeter is becoming a vague concept. This reality is