Akamai Diversity

Akamai Security Intelligence
& Threat Research

Kathryn Kun

Kathryn Kun

February 25, 2021 9:00 AM

OPTIMIZING FOR PERFORMANCE, ONE HIRE AT A TIME: PART ...

Having previously decided we need to make a new hire onto our team, part 1 of this series examined how to meet the needs of our team going into the future, instead of just adding surface visible technical skills. In part 2, we designed and built an interviewing sensor platform to identify the best candidates from our pool for our needs. In this final piece, we're looking at a particular

Evyatar Saias

Evyatar Saias

February 23, 2021 9:00 AM

Bitcoins, blockchains, and botnets

Additional research and reporting provided by: Chad Seaman Executive Summary A recent piece of malware from a known crypto mining botnet campaign has started leveraging Bitcoin blockchain transactions in order to hide its backup C2 IP address. It's a simple, yet effective, way to defeat takedown attempts. Recent infection attempts against Akamai SIRT's custom honeypots uncovered an interesting means of obfuscating command and control (C2) infrastructure information. The operators of

Guest Blogger

Guest Blogger

February 19, 2021 9:00 AM

Out of My Depth (Where I Belong)

By Molly Elise Young I remember well my first day as a member of Akamai's InfoSec department. The Friday prior, I'd just completed the Akamai Technical Academy, a five-month crash-course in all things tech, and was now, on a cold but sunny Monday morning, joining InfoSec for their weekly staff meeting. Eager to make a good first impression, I took a seat at the large, crowded conference table, opened my

Or Katz

Or Katz

February 18, 2021 9:00 AM

Massive Campaign Targeting UK Banks Bypassing 2FA

On 14 July, 2020, Oliver Hough, a security researcher from Cyjax, published a report centered on a phishing campaign targeting banking customers in the United Kingdom, which evades two-factor authentication (2FA). On 16 December, 2020, researchers from the Global Threat Intelligence Team at WMC disclosed that they were tracking a threat actor who goes by the alias "Kr3pto".

Kathryn Kun

Kathryn Kun

February 16, 2021 9:29 AM

OPTIMIZING FOR PERFORMANCE, ONE HIRE AT A TIME: PART ...

In part 1, we focused on identifying the current and future needs of your team, in order to build a space of skills and characteristics for a successful hire, and build a highly productive team. In part 2, we use that lofty vision to build a plan to identify a candidate that has the necessary skills to fill that gap for our team.

Steve Ragan

Steve Ragan

February 11, 2021 12:00 PM

What is a Data Scientist? A Discussion with Chelsea ...

Join Amanda, Steve, and Chelsea as they talk about winter, data science, food science, and kickboxing. In today's episode, Chelsea Tuttle, the Senior Data Scientist who works on the SOTI reports, joins us to talk about how she got her start in data science in security, and explains exactly what a data scientist is.

Steve Ragan

Steve Ragan

February 11, 2021 9:00 AM

NHS Vaccine Scams: Criminals Still Targeting COVID-1 ...

It's 2021, but the anxiety, fear, uncertainty, and stress caused by the COVID-19 pandemic in 2020 is very much alive today. Criminals are targeting the most vulnerable among us, using the lure of COVID-19 vaccination in their most recent phishing campaigns. Today's post will examine some of the history related to COVID-19 scams, and the latest vaccination scam, which the National Health Service (NHS) in the UK is warning the

Kathryn Kun

Kathryn Kun

February 10, 2021 9:00 AM

Optimizing for Performance, One Hire at a Time: Par ...

It's a lot of fun to imagine and design the best team. As managers, it's rare that we get to build a team from the ground up and all at once. Often we're given the ability to hire incrementally - one or two people, replacing someone who left or starting up a project. Even if we are building a team from scratch, we don't often get to hire a whole

Guest Blogger

Guest Blogger

February 9, 2021 8:40 AM

Command Injection on a D-Link Router

Written By, Assaf Vilmovski During the COVID-19 pandemic, I wanted to extend the local WiFi in my home to reach all the floors. The goal was to have full connectivity from every location in the house. As excited as I was to deploy the device and extend my network, eventually we decided to keep the top floor WiFi free, and I was left with a spare router. I decided to