We’ve recently had more questions about deploying WiKID for two-factor authentication for AD admins to thwart potential privilege escalation in ransomware attacks. We’ve done a proof-of-concept showing that WiKID can make privilege escalation quite di…
Top Cyber Security Challenges Post Lockdown
By Sam Jones | Cyber Tec Security Not too long ago things were looking bleak for the world, still under the dark cloud of the COVID pandemic, but with vaccine rollouts now taking place worldwide, there is finally a light at the end of the tunnel. It’s…
Trusting Locations Bites Us Yet Again
Recently, Microsoft announced the discovery of yet another attack being launched by the now infamous Nobelium group, which has been responsible for numerous successful attacks, including the widespread SolarWinds breach in 2020.
Philippine Air Force makes final push for Multi-Role Fighters with Saab JAS-39C/D Gripen
The Philippine Air Force (PAF) has started to make its final chance to push for the acquisition of new Multi-Role Fighter (MRF) aircraft, as securing funding for modernization projects has reached the final few months.And based on information MaxDefens…
How Network Segmentation Simplifies PCI DSS Compliance
Read more about how proper network segmentation can simplify PCI DSS compliance by effectively reducing the number of assets in scope.
Now Available: EdgeKV Distributed Key-Value Store
We’re excited to announce the availability of EdgeKV, a distributed key-value store database that enables EdgeWorkers to leverage data stored at the edge when deploying custom code across our serverless computing platform.
Cyber Security Roundup for June 2021
A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, May 2021.UK Smarties Cities Cybersecurity WarningThe UK National Cyber Security Centre (NCSC…
SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities
Part of Akamai’s incident management process for vulnerabilities in third party software involves verifying potential impact in other systems using the same or similar libraries.
How Enigmo Moved Logic from Client to Origin to Edge
Enigmo owns BUYMA, a Japanese fashion C2C marketplace that helps people buy and sell high-quality goods from overseas on www.buyma.com.
SAML Implementation Vulnerability Impacting Some Akamai Services
This blog post provides an overview of a vulnerability discovered in Akamai’s Enterprise Application Access (EAA) product which has been patched.