Ransomware tactics have continued to evolve over the years, and remain a prominent threat to both SMBs and larger organisations. Particularly during the peak of COVID-19, research by IBM found that ransomware incidents ‘exploded’ in June 2020…
Jest Mocks?Unit Testing for EdgeWorkers
In case you haven?t already been working with EdgeWorkers, it allows you to run JavaScript code across more than 4,200 locations for proximity to users and fast application response times.
With more and more application functionality moving to the edg…
Holiday Readiness, Part Two: What you Should be Thinking About Three Months Out?Capacity Planning
Welcome back to the Holiday Readiness blog series. We hope part one has kept you busy over the past month as you continue to improve your security posture. If you haven?t finished all of the security checklist items, don?t worry ? there is still time b…
Passwords ? Extinction Event Looming?
Passwords are the bane of users and security teams? lives. Despite years of security teams educating users about not using 123456 as a password, not recycling passwords across multiple personal and professional accounts, and implementing even more rigo…
UPX Packed Headaches
Researching malware has many challenges. One of those challenges is obfuscated code and intentionally corrupted binaries. To address challenges like this, we’ve written a small tool in C that could fix intentionally corrupted binaries automatically. W…
Dogged Persistence?The Name of the Game for One DDoS Attacker
With DDoS, we typically observe a moderate degree of attacker persistence. DDoS attacks are relatively easy to launch from a number of online booter services, and the availability of cryptocurrencies for payment has made it easy to remain anonymous. At…
The Top 10 Safest Colleges in Texas
College-Bound Freshmen: See Which Colleges are the Safest in Your State in 2020 Living in Texas certainly has its perks. Between year-round warm weather, a low cost of living, tons of post-college job opportunities, and TexMex everywhere, there a…
Tokyo Streaming Traffic Runs Rings Around Rio
With 35 medals at stake, the last full day of competition during the games in Tokyo generated the highest video streaming traffic for 30-plus customers on the Akamai Intelligent Edge Platform. Medal matches for baseball, basketball, and soccer, along w…
Defensive Security Podcast Episode 258
https://arstechnica.com/gadgets/2021/07/malicious-pypi-packages-caught-stealing-developer-data-and-injecting-code/
https://arstechnica.com/gadgets/2021/07/feds-list-the-top-30-most-exploited-vulnerabilities-many-are-years-old/
https://www.securityweek….
How Businesses Can Utilise Penetration Testing
Understand your security vulnerabilitiesArticle by Beau PetersThe basic approaches like phishing simulations are good, but they tend to have limited reach. This is why more agile methods, penetration testing among them, have been getting incr…