Akamai Technologies
Follow
109 Followers
Follow Akamai Technologies on their other social channels!
About Us
Founded:
1998
Company Size:
5001-10000 employees
Company Type:
Public
Location:
Cambridge, MA (HQ) / Global
Website:
If you've ever shopped online, downloaded music, watched a web video or connected to work remotely, you've probably used Akamai's cloud platform. Akamai helps businesses connect the hyperconnected, empowering them to transform and reinvent their business online. We remove the complexities of tech ...
Read more
Promoted Content
Spring 2018 Release What’s new with the Akamai Intelligent Platform™
Follow
1132
Memcached UDP Reflection Attacks
Akamai is aware of a new DDoS reflection attack vector: UDP-based memcached traffic.  Memcached is a tool meant to cache data and reduce strain on heavier data stores, like disk or databases. The protocol allows the server to be queried for information about key value stores and is only intended to be used on systems that are not exposed to the Internet. There is no authentication required with memcached.  When this is added to the ability to spoof IP addresses of UDP traffic, the protocol ...
Follow
1264
The Pitfalls of Guest Wi-Fi
Do you remember the days before mobile broadband was commonplace and connection speeds on 2G wireless were barely usable? How often did you seek out a specific location such as a coffee shop or a hotel that offered a free or (more likely) purchasable Wi-Fi connection? Times have changed. Now, we expect to have free and performant Wi-Fi wherever we happen to be - on a train, at an airport, visiting our favorite retail destination, at a baseball game, and in other public spaces. ...
Follow
416
Gone Phishing For The Holidays
While our team, Akamai's Enterprise Threat Protector Security Research Team, monitored internet traffic throughout the 2017 holiday season, we spotted a wide-spread phishing campaign targeting users through an advertising tactic. During the six week timeframe, we tracked thirty different domains with the same prefix: "holidaybonus{.}com". Each one advertised the opportunity to win an expensive technology prize - a free iPhone 8, PlayStation 4, or Samsung Galaxy S8. The websites associated ...
Follow
526
A Death Match of Domain Generation Algorithms
Today's post is all about DGA's (Domain Generation Algorithms): what they are, why they came into existence, what are some use cases where they are used, and, most importantly - how to detect and block them. As we will demonstrate here, the most effective defense against DGAs is a combination of traditional methods with modern machine intelligence. DGA: WHAT AND WHY? The dictionary definition of Domain generation algorithms (DGA) is "algorithms seen in various families of malware that are used ...
Follow
857
Attack of the Killer ROBOT
On Dec 12th, 2017, researchers Hanno Böck, Juraj Somorovsky and Craig Young published a paper detailing an attack they called the Return Of Bleichenbacher's Oracle Threat (ROBOT)(https://eprint.iacr.org/2017/1189). This attack, as the name implies, is an extension of an attack published in 1998 (https://link.springer.com/content/pdf/10.1007%2FBFb0055716.pdf) that affects systems using certain implementations of RSA key exchange. Customers have voiced concerns about this threat and asked how Ak ...
Follow
463
Retailers capitalize on mobile experiences to generate record revenue during Black Friday and Cyber Monday
The results are in, Black Friday and Cyber Monday broke all records in 2017 as the total revenue for these days exceeded $11.5 billion. Anticipating that more consumers would shop online, retailers invested in digital experiences and geared up for the holidays by (i) stocking fewer items in stores to reduce inventory costs and (ii) hiring few seasonal workers. Retailers' predictions were accurate, and their investment in digital experiences paid off, as close to 40% of the Black Friday revenue w ...
Follow
447
Do You Believe in Serendipity?
In December 2016, after a month of mountain bike racing and touring in Nepal, I commenced the Executive Program in General Management at MIT. The first term was at Sloan School of Management in Cambridge and for the first time in my life, I finally could relate to studying. In fact, I was even enjoying it! One of the many practical subjects was "How Companies Become Platform Leaders" by Professor Pierre Azoulay with references to MIT alum companies like Dropbox; and a fascinating case study ...
Follow
988
Layered Security Without the Layered Complexity
With the recent influx of news reports regarding security incidents, more Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), and IT professionals are reviewing current security infrastructures, policies, and practices to identify potential weaknesses in their security posture. This has long been best practice, but with the progressive use of various attack and threat vectors now employed by malicious actors against businesses, this practice must be constantly in ...
Follow
976
Data Breaches and Credential Stuffing: Don’t Get TKOd
By Patrick Sullivan It has been a very rough month for the information security community.  It feels like we've been on the losing end of a championship fight against Floyd Mayweather. The body shots started with Equifax and continued with attacks on the US Government. The assault included a couple of combination shots as Equifax expanded the scope of their breach by adding millions of additional impacted accounts and as reports emerged that this was not the first breach for Equ ...
Follow
577
Cybersecurity Executive Order 13800: More than a Risk Assessment?
Most folks around the Washington DC beltway have heard the cybersecurity Executive Order (EO 13800 - Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure) referred to as a simple risk assessment. But the reality is that it is much more about broadly modernizing federal IT infrastructure and improving the cybersecurity of our federal networks. Sure, the first step is a risk management report, but the next focuses on procurement of shared IT, including cloud and cybe ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

HoneyBOT
Views: 449 / April 21, 2018
Protect Your PC from Attack in 4 Steps
Views: 452 / April 21, 2018
Advanced PDS: OST to PST Converter Solution
Views: 266 / April 21, 2018
XFS File System – RHEL7
Views: 994 / April 20, 2018
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel