Get In Touch
Having previously decided we need to make a new hire onto our team, part 1 of this series examined how to meet the needs of our team going into the future, instead of just adding surface visible technical skills. In part 2, we designed and built an interviewing sensor platform to identify the best candidates from our pool for our needs. In this final piece, we're looking at a particular
Additional research and reporting provided by: Chad Seaman Executive Summary A recent piece of malware from a known crypto mining botnet campaign has started leveraging Bitcoin blockchain transactions in order to hide its backup C2 IP address. It's a simple, yet effective, way to defeat takedown attempts. Recent infection attempts against Akamai SIRT's custom honeypots uncovered an interesting means of obfuscating command and control (C2) infrastructure information. The operators of
By Molly Elise Young I remember well my first day as a member of Akamai's InfoSec department. The Friday prior, I'd just completed the Akamai Technical Academy, a five-month crash-course in all things tech, and was now, on a cold but sunny Monday morning, joining InfoSec for their weekly staff meeting. Eager to make a good first impression, I took a seat at the large, crowded conference table, opened my
On 14 July, 2020, Oliver Hough, a security researcher from Cyjax, published a report centered on a phishing campaign targeting banking customers in the United Kingdom, which evades two-factor authentication (2FA). On 16 December, 2020, researchers from the Global Threat Intelligence Team at WMC disclosed that they were tracking a threat actor who goes by the alias "Kr3pto".
In part 1, we focused on identifying the current and future needs of your team, in order to build a space of skills and characteristics for a successful hire, and build a highly productive team. In part 2, we use that lofty vision to build a plan to identify a candidate that has the necessary skills to fill that gap for our team.
Join Amanda, Steve, and Chelsea as they talk about winter, data science, food science, and kickboxing. In today's episode, Chelsea Tuttle, the Senior Data Scientist who works on the SOTI reports, joins us to talk about how she got her start in data science in security, and explains exactly what a data scientist is.
It's 2021, but the anxiety, fear, uncertainty, and stress caused by the COVID-19 pandemic in 2020 is very much alive today. Criminals are targeting the most vulnerable among us, using the lure of COVID-19 vaccination in their most recent phishing campaigns. Today's post will examine some of the history related to COVID-19 scams, and the latest vaccination scam, which the National Health Service (NHS) in the UK is warning the
It's a lot of fun to imagine and design the best team. As managers, it's rare that we get to build a team from the ground up and all at once. Often we're given the ability to hire incrementally - one or two people, replacing someone who left or starting up a project. Even if we are building a team from scratch, we don't often get to hire a whole
Written By, Assaf Vilmovski During the COVID-19 pandemic, I wanted to extend the local WiFi in my home to reach all the floors. The goal was to have full connectivity from every location in the house. As excited as I was to deploy the device and extend my network, eventually we decided to keep the top floor WiFi free, and I was left with a spare router. I decided to