Akamai Diversity

Akamai Security Intelligence & Threat Research

Ali Fakeri Tabrizi

Ali Fakeri Tabrizi

October 27, 2017 3:23 PM

The Many Security Usages of Anomaly Detection

The most common use of network infrastructure is to facilitate legitimate communication between two parties across the network. Unfortunately, the same network infrastructure provides an opportunity for malicious communications.

Hongliang Liu

Hongliang Liu

October 2, 2017 2:30 PM

mpaaweb.com amplification attack: Welcome to a new e ...

In today's post we describe a new amplification attack we've observed only a few days ago, and which we believe is a new phase in the evolution of DDoS attacks. Before getting into the details, let's start with a quick recap of what amplification attacks really are.

Hongliang Liu

Hongliang Liu

September 11, 2017 3:17 PM

Detecting file-less malware with file-less detection

File-less malware is malware that exists exclusively as a computer memory-based artifact (i.e., in RAM). It doesn't write any of its activities to the hard drive, so it has no footprint in the file system. According to Carbon Black, this type of attack is on the rise: 97% of their customers were targeted by a file-less malware in 2016. The reason for its proliferation? Quite simply, it works.