Please turn on your JavaScript for this page to function normally.
cryptocurrency
Tactics that make crypto giveaway scams so successful

The illicit market for crypto giveaway scams has expanded, offering various services to facilitate fraudulent activity. The proliferation of fake crypto giveaways can be …

security platform
Akamai introduces new premium offering and updated managed security service program

Akamai introduced an updated managed security service program and premium service offerings. The new capabilities are intended to help customers protect their businesses …

Handshake
CIS expands partnership with Akamai to protect state and local governments

Cyberattacks often begin with an unsuspecting user clicking on a link that redirects them to a harmful site containing malware. Even the best employee training won’t …

traffic
Tracking the global spread of malware

Approximately 10-16 percent of organizations have shown evidence of malicious command and control (C2) activities, strongly indicating a network breach within the last year, …

security platform
Akamai unveils new service and tools to help users reduce attack surface

Akamai Technologies has introduced the Akamai Hunt security service that enables customers to capitalize on the infrastructure of Akamai Guardicore Segmentation, …

Acquisitions
Akamai acquires Ondat to strengthen its cloud computing offerings

Akamai Technologies reached a definitive agreement to acquire Ondat, a cloud-based storage technology provider with a Kubernetes-native platform for running stateful …

security platform
Akamai Connected Cloud helps enterprises deploy and secure distributed applications

Akamai Technologies has launched Akamai Connected Cloud, a massively distributed edge and cloud platform for cloud computing, security, and content delivery that keeps …

certificate
Researchers release PoC exploit for critical Windows CryptoAPI bug (CVE-2022-34689)

Akamai researchers have published a PoC exploit for a critical vulnerability (CVE-2022-34689) in Windows CryptoAPI, which validates public key certificates. “An attacker …

DDoS
The most significant DDoS attacks in the past year

DDoS attacks are getting larger and more complex moving towards mobile networks and IoT, which are now used in cyberwarfare. In this Help Net Security video, Steve Winterfeld, …

arrows
Stop audience hijacking and defend against redirection to malicious websites

The holidays are just around the corner, and the competition for consumer attention and dollars promises to be fierce. According to Akamai research, up to 20% of potential …

security platform
Akamai Prolexic enhancements increase protection against rising DDoS threats

Akamai announced a significant evolution of its DDoS protection platform (Prolexic) with a global rollout of new, fully software-defined scrubbing centers, which will extend …

DNS
Malicious DNS traffic targets corporate and personal devices

Akamai’s security research team examined potentially compromised devices, discovering that 12.3% communicated with domains associated with malware or ransomware during Q2 …

Don't miss

Cybersecurity news