In our previous blogs, first where we explained JavaScript Obfuscation techniques and introduced a detailed overview on how JavaScript is being used to obfuscate page content to make phishing attacks and other web scams as evasive as possible; followed…
Onboarding During A Pandemic: Can It Really Work? New Joiner, Lily Nguyen, Shares Her Experience.
I recently joined the Sales Development APAC team, looking after the Vietnam, Thailand and Hong Kong markets. I’d already had a great impression of Akamai’s culture from my interview rounds. But how would the onboarding work? I’d been looking forward t…
The Tale of Double JavaScript Obfuscated Scam
The phishing landscape is constantly evolving. Over the years, it has evolved into a more scalable threat, with an overwhelming amount of campaigns being launched daily. Phishing also changed when criminals started adding more capabilities and features…
Akamai Edge Cloud: Scaling IoT, Part 2
IoT has tremendous possibilities to transform our world but will fall short of expectations if the underlying infrastructure cannot support the rapid exchange of massive amounts of information from billions of simultaneous and intermittent connections….
ATA 8.0 Graduation Ceremony
Akamai Technical Academy is a training program designed for people who have an interest and aptitude for technology but may not come from a traditional technical background. Up until now, we have successfully onboarded over 140 incredible people in thr…
5G, Security, IoT, Asavie, and Akamai
Malicious actors never rest and have always worked remotely. That simple realization hit home during recent global events. Specifically, Akamai saw an increase in malware traffic of over 400% between March 9 and May 11, 2020 from corporate devices, mos…
Catch Me if You Can?JavaScript Obfuscation
While conducting threat research on phishing evasion techniques, Akamai came across threat actors using obfuscation and encryption, making the malicious page harder to detect. The criminals were using JavaScript to pull this off….
MITRE ATT&CK Tactics Are Not Tactics
Just what are “tactics”?IntroductionMITRE ATT&CK is a great resource, but something about it has bothered me since I first heard about it several years ago. It’s a minor point, but I wanted to document it in case it confuses anyone else.The MI…
Philippine Army’s Light Tank and Wheeled APC projects awarded to Israel’s Elbit Systems
With the Philippines looking at reopening itself to business despite COVID-19 pandemic still ongoing, it looks like the Department of National Defense (DND) and the Armed Forces of the Philippines (AFP are doing the same now.As the Department of Budget…
2020 DDoS Extortion Campaign — A Sequel More Thrilling Than the Original
As the go-to enterprise distributed denial-of-service (DDoS) mitigation experts, our phones have been “ringing off the hook” since the release of the global extortion DDoS campaign sequel. This latest installment of the cybersecurity saga is bigger, ba…