Recently, there has been a plethora of UPX packed crypto-mining malware written in Golang targeting Linux systems and web applications popping up in the news. The malware?s primary tactic is to spread by taking advantage of vulnerable systems and weak …
Akamai?s Flagship Customer Enablement Program, Akamai University, Wins Gold ?Excellence in Learning? Award
The Technical Enablement and Education team, part of Akamai?s Global Services organization, has won a coveted Brandon Hall Group Gold award for ?Best Customer Training Program,? for Akamai?s flagship customer training and enablement program, Akamai Uni…
Now Live: On-Demand Learning and Hands-On Labs at Learn Akamai
I?m excited to announce our new all-inclusive Learning Hub as the single destination for all product learning resources at Akamai. This new Hub gives users the ability to choose the method of learning that suits them best, whether that?s reading throug…
Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)
Today we have released the newest version of Kali Linux, 2021.3 (quarter #3), which is now ready for download or updating.
A summary of the changes since the 2021.2 release from June are:
OpenSSL – Wide compatibility by default – Keep reading for what…
Prevention is Better Than Cure: The Ransomware Evolution
Ransomware tactics have continued to evolve over the years, and remain a prominent threat to both SMBs and larger organisations. Particularly during the peak of COVID-19, research by IBM found that ransomware incidents ‘exploded’ in June 2020…
Jest Mocks?Unit Testing for EdgeWorkers
In case you haven?t already been working with EdgeWorkers, it allows you to run JavaScript code across more than 4,200 locations for proximity to users and fast application response times.
With more and more application functionality moving to the edg…
Holiday Readiness, Part Two: What you Should be Thinking About Three Months Out?Capacity Planning
Welcome back to the Holiday Readiness blog series. We hope part one has kept you busy over the past month as you continue to improve your security posture. If you haven?t finished all of the security checklist items, don?t worry ? there is still time b…
Passwords ? Extinction Event Looming?
Passwords are the bane of users and security teams? lives. Despite years of security teams educating users about not using 123456 as a password, not recycling passwords across multiple personal and professional accounts, and implementing even more rigo…
UPX Packed Headaches
Researching malware has many challenges. One of those challenges is obfuscated code and intentionally corrupted binaries. To address challenges like this, we’ve written a small tool in C that could fix intentionally corrupted binaries automatically. W…
Dogged Persistence?The Name of the Game for One DDoS Attacker
With DDoS, we typically observe a moderate degree of attacker persistence. DDoS attacks are relatively easy to launch from a number of online booter services, and the availability of cryptocurrencies for payment has made it easy to remain anonymous. At…