Akamai Diversity

Akamai Security Intelligence
& Threat Research

Larry Cashdollar

Larry Cashdollar

October 12, 2018 8:14 AM

An Examination of a Phishing Kit Dubbed Luis

There have been plenty of articles describing the structure of phishing emails, and how to spot them. However, less explored, are phishing websites - what they are, how they are used, and how users can protect themselves. We'll take a deep dive into a particular phishing website and the methods used in the author's attempt to avoid detection. While reading through my Twitter feed, I noticed a tweet from @WifiRumHam

Ryan Barnett

Ryan Barnett

October 11, 2018 7:33 AM

Security Response Headers: What They Are, Why You Sh ...

Security response headers are a critical security capability that all organizations should consider. This blog post is the first in a series that will discuss different security headers and go in-depth with how to configure them for maximum benefit. For cyber criminals, attacking a web application directly is not the only option available. They also have the ability target other users of the system in order to steal their information,

Akamai SIRT Alerts

Akamai SIRT Alerts

September 14, 2018 7:44 AM

Root KSK Roll: Replacing the Root of Trust for the D ...

By Tim April -------- Update (Sept. 17, 2018): On Sunday, September 16th, the ICANN Board adopted a resolution instructing the ICANN Organization to continue the Root KSK Roll as planned, switching the Root KSK at 1600 UTC on October 11, 2018. --------- On October 11, 2018 -- for the first time ever -- the Root Key Signing Key (Root KSK), that is the single root of trust used to verify

Ryan Barnett

Ryan Barnett

September 11, 2018 11:48 AM

New Tsunami/Kaiten Variant: Propagation Status

Ryan Barnett, Principal Security Researcher, Akamai Moshe Zioni, Director of Threat Research, Akamai Recent news reports have highlighted the latest evolution of the Mirai botnet code, which is itself an evolution of the Kaiten botnet. The botnet developers have leveraged features from an open-source project, called Aboriginal Linux, that results in a cross platform compiled binary. Needless to say, this greatly increases the success rates of spreading the Mirai malware

Ryan Barnett

Ryan Barnett

August 28, 2018 6:04 AM

The Dark Side of APIs: Denial of Service Attacks

Ryan Barnett, Principal Security Researcher, Akamai Elad Shuster, Senior Security Researcher, Akamai In this blog post, we will discuss different Denial of Service (DoS) attacks that may negatively impact your API services, as well as mitigations offered by Kona Site Defender (KSD).

Ryan Barnett

Ryan Barnett

August 24, 2018 1:46 PM

Attack Status: Apache Struts Vulnerability (CVE-201 ...

This blog post is a follow-up to https://blogs.akamai.com/2018/08/apache-struts-vulnerability-cve-2018-11776.html and its purpose is to highlight attack data we have seen on the Akamai network related to this vulnerability.

Lydia LaSeur

Lydia LaSeur

August 17, 2018 12:51 PM

The Diversity and Density of Web Application Attacks ...

Our exploration of methods for normalizing the number of web application attacks sourced by each country has only considered contextual variables from external sources that characterized each country in a context devoid from Akamai, so far. This final leg of the journey will situate the attack counts within a context that is specific to Akamai and the characteristics of the attacks themselves.

Akamai

Akamai

August 14, 2018 10:22 AM

Linux Kernel IP Vulnerability 2

On the week of July 15th, researcher Juha-Matti Tilli disclosed a vulnerability in the Linux kernel to the kernel maintainers, the National Cyber Security Center - Finland (NCSC-FI), CERT Coordination Center (CERT/CC), and Akamai. The vulnerability, CVE-2018-5391, is a resource exhaustion attack triggered by a specially crafted stream of IP datagrams that cause expensive processing within the Linux kernel. This vulnerability is similar to the Linux TCP vulnerability announced August,

Lydia LaSeur

Lydia LaSeur

August 8, 2018 7:22 AM

Data Spaghetti: Throw it at the wall and see what st ...

In the last installment, we introduced the challenge of normalizing a geographic visualization showing the observed number of web application attacks sourced from each country. This time, we'll try to discern which potential normalizing variables could have a significant relationship with the attack counts through exploratory analysis and hopefully gain some new insights.