Akamai Diversity

Akamai Security Intelligence & Threat Research

Amiram Cohen

Amiram Cohen

December 5, 2018 8:00 AM

Threat Hunting When the Perimeter is Vague

Are Domains Malicious? The most basic capability of malware is the ability to communicate. Most malware will use the DNS protocol to enable robust communication. Typical malware payloads will use such techniques to download files to the compromised machine, or to communicate with the Command and Control (CnC) servers in order to control activities or exfiltrate data. These days, the defensive perimeter is becoming a vague concept. This reality is

Larry Cashdollar

Larry Cashdollar

November 20, 2018 2:00 PM

jQuery File Upload Disclosure Due Diligence

After I disclosed the arbitrary file upload vulnerability in Blueimp's jQuery File Upload project in early October I decided to investigate similar projects. I found a list of the top 20 jQuery file upload projects that listed both free open source and commercial repositories. I started to examine the code that didn't require a purchase, and found the majority didn't provide a method to actually upload the file. They simply

Daniel Abeles

Daniel Abeles

October 8, 2018 10:39 AM

Capturing the HackerOne Flag

by Daniel Abeles & Shay Shavit HackerOne is a bug bounty platform that allows hackers around the world to participate in bug bounty campaigns, initiated by HackerOne's customers. Recently, HackerOne announced they would be hosting a special live hacking event in Buenos Aires along side a week long security conference, Ekoparty 14. In order to participate the special event, you either have to be a top ranked hacker on their

Akamai SIRT Alerts

Akamai SIRT Alerts

June 19, 2018 6:52 AM

Anonymous #OpIcarus2018

Written by Lisa Beegle OVERVIEW Operation #OpIcarus2018 has been announced and it encompasses several on-going campaigns, including #OpPayBack, #OpIcarus, #DeleteTheElite, and #SosNicaragua. The attack campaign(s) are being driven by actors using Anonymous iconography and ideological motives. These malicious actors have stated their intent to attack various banking institutions between June 21 through 28 2018. Targeted enterprises need to be on heightened alert leading up to these dates, as there are

Thanh Nguyen

Thanh Nguyen

May 2, 2018 5:28 AM

Domain Reputation System: building a large graph to ...

Why do we need a Knowledge Base system Let me start with an obvious statement: the Internet generates a lot of data. Every day we, Akamai's security research teams, see billions of DNS queries, millions of domains, and who knows how many IP addresses. This is an exciting thing, especially if you're a data scientist. In the past year, we have taken on a "simple task": to map the "dark