Get In Touch
Researchers at Akamai observed attackers using a novel approach for evading detection. This new technique - which we call Cipher Stunting - has become a growing threat, with its roots tracing back to early-2018. By using advanced methods, attackers are randomizing SSL/TLS signatures in an attempt to evade detection attempts.
Real-world data on how adding DNS data to a deep learning model increases its effectiveness By Yael Daihes & Craig Sprosts These days, big data and machine learning are topics of frequent discussion within the security community. While the idea that machine learning algorithms prosper with access to more data is hardly a revelation, we wanted to dig deeper and conduct an experiment using global DNS traffic. More specifically, how
Summary Magento users should patch their systems to the fixed versions 2.3.1, 2.2.8 and 2.1.17 immediately due to multiple severe vulnerabilities disclosed in Magento on March 26, 2019.
Akamai Engineering Culture Akamai is an environment fueled by the desire to learn and improve. There are open engineering and training courses, wikis, live training sessions, as well as engineer lead lecture series. Most importantly there is a strong culture around continued personal and professional development. The Security Operations Control Center (SOCC), for example, has a continuous training program where team members are given a full day, every week, dedicated
It's the most wonderful time of the security year - it's almost RSA week! If the world is coming together to talk about security next week, we figured we should join the conversation with our latest State of the Internet report. Joining the conversation is a big part of security departments these days, as we move away from being perceived as a "department of no" to really being seen as
When it comes to phishing, criminals put a lot of effort into making their attacks look legitimate, while putting pressure on their victims to take action. In today's post, we're going to examine a recent phishing attempt against me personally. This is an interesting attack, as it uses Google Translate, and targets multiple accounts in one go.
Is it too late to still say "Happy New Year?" We don't think so. We're kicking off 2019 with our first issue of the State of the Internet / Security.
By Lukasz Orzechowski If you work on an Information Security team that gets customer questionnaires, you're likely familiar with Vendor Security Risk Assessment templates. We all care about information safety, and it is natural for our customers to want to check how well we are aligned with what they require internally, or with industry standards. We get a lot of questions and addressing them is our bread and butter. One
While investigating the recent Magecart card skimming attacks, I came across a payload I was not familiar with. Further research into it lead me to discover that in December a researcher disclosed a remote command execution vulnerability in ThinkPHP, a web framework by TopThink.