The North Korean APT is using a fake job posting for Coinbase in a cyberespionage campaign targeting users of both Apple and Intel-based systems.
Deploying Akamai MFA at Scale: 6 Lessons Learned
Planning a multi-factor authentication (MFA) rollout? Take a look at the six lessons we learned when we deployed Akamai MFA.
Xiaomi Phone Bug Allowed Payment Forgery
Mobile transactions could’ve been disabled, created and signed by attackers.
Black Hat and DEF CON Roundup
‘Summer Camp’ for hackers features a compromised satellite, a homecoming for hackers and cyberwarfare warnings.
Control is …
… technical, physical, procedural, legal, social, mechanical, economic, political …… applied to processes, systems, machines, people, quality … … [a] “measure that maintains and/or modifies riskNote 1 to entry: Controls include, b…
CVE-2022-30216 – Authentication coercion of the Windows ?Server? service
In this blog, see how an off-by-one error could lead to domain controller access in Microsoft Server Service.
Feds: Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics
The CISA has seen a resurgence of the malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities.
It?s Time to Protect Every SIM
Ensuring the security of billions of mobile devices is a priority. Learn how Akamai aims to protect and secure every SIM as we continually adapt to new threats.
Unmanned program could suffer if Congress blocks F-22 retirements, Hunter says
The Air Force wants to retire 33 older F-22s in fiscal 2023, but Congress wants the service to keep the fighter jets and bring them to parity with newer variants.
UK to test Sierra Nevada’s high-flying spy balloons
Sierra Nevada Corporation, an aerospace and defense company, will provide the United Kingdom with high-altitude uncrewed balloons to be used for surveillance and reconnaissance.