Akamai Diversity

Akamai Security Intelligence
& Threat Research

Hieu Vuong

Hieu Vuong

October 20, 2020 8:00 AM

COVID-19 Related Phishing: A Personal Viewpoint

Dealing with unforeseen challenges around the COVID-19 pandemic has impacted people around the world. The overwhelming amount of news coverage for the coronavirus has created new opportunities for scammers and resulted in millions of phishing attempts as confusion and misinformation have allowed threat actors to take advantage of vulnerable people, concerned for their health.

Tom Emmons

Tom Emmons

October 16, 2020 5:00 AM

DDoS Extortion Examination

In terms of the Distributed Denial of Service (DDoS) landscape, 2020 was almost boring prior to the beginning of August. The excitement from the record peak Gbps and Mpps seen in early summer had worn off, and we weren't seeing a ton of interesting attacks

Steve Ragan

Steve Ragan

October 15, 2020 8:00 AM

A Discussion with Amanda Berlin, CEO of Mental Healt ...

Steve Ragan and Martin McKeay sit down with Amanda Berlin, the CEO of Mental Health hackers to discuss her previous guest essay in the State of the Internet / Security report, and where her organization is today. In addition, the discussion also explores ways to improve mental health, and its impact on security overall.

Akamai InfoSec

Akamai InfoSec

October 13, 2020 8:24 AM

Protecting Your Home, 3 Steps at a Time!

written by, Nicholas Caron Securing your devices in this era of connected everything can quickly mount to an insurmountable quagmire. You, the impromptu system administrator, are thrust into an anxiety-inducing position of learning of endless new threats to your home devices, all while trying to please your increasingly annoyed housemate, who would just like to add their WiFi enabled blender to the network. The deeper you dive, the more confusing

Steve Ragan

Steve Ragan

October 8, 2020 8:00 AM

Don't Blame The User: A Discussion

Today's post is something different. For National Cyber Security Awareness Month (NCSAM), Steve Ragan, Martin McKeay, and Andy Ellis sat down for a casual conversation about not blaming users, problems with IOT, and some previously undiscussed tips for staying secure while working from home.

Akamai InfoSec

Akamai InfoSec

October 6, 2020 11:00 AM

The Talk: Keeping my parental units safe

Dear Favorite Parental Unit, What will it take to convince you? You helped me through homework for years. You taught me right from wrong. You reinforced good habits. It's my turn to return the favor. It's time to turn the tables, and make the computer work for you. It's time to talk about passwords and the internet.

Larry Cashdollar

Larry Cashdollar

October 1, 2020 8:00 AM

Music to Hack To: My First CVE and 20 Years of Vulne ...

October is National Cyber Security Awareness Month (NCSAM). I've been doing security and vulnerability research since 1994, and a lot has changed in the industry. For this post, in honor of NCSAM, I'm going to revisit my first CVE (Common Vulnerabilities and Exposures), and offer some general observations and stories from the past.

Amanda Fakhreddine

Amanda Fakhreddine

September 23, 2020 5:00 AM

State of the Internet/ Security: You Can't Solo Secu ...

We all know that security touches virtually every vertical and impacts our daily lives. But the topic of games, and the gaming industry, is near and dear to the SOTI team's hearts. Many on our team are gamers, and this year, the gaming world has been more than just a place to pass time and build worlds - it's been a way to keep the feeling of community alive.

Akamai SIRT Alerts

Akamai SIRT Alerts

August 17, 2020 3:54 PM

Ransom Demands Return: New DDoS Extortion Threats Fr ...

Update 08/24/2020 As mentioned below, the Akamai SIRT has been tracking attacks from the so-called Armada Collective and Fancy Bear actors, who are sending ransom letters to various industry verticals such as finance, travel, and e-commerce. In addition to the information in our previous advisory, we can confirm that we're now seeing attacks peak at almost 200 Gb/sec, utilizing ARMS, DNS Flood, GRE Protocol Flood, SNMP Flood, SYN Flood, and