While recently examining hundreds of phishing kits for ongoing research, Akamai discovered something interesting – several of the kits included basic vulnerabilities due to flimsy construction or reliance on outdated open source code. Considering the i…
The best Spanish food and drink to keep you cool during the summer heat
If the summer heat is making you lose your appetite, these delicious Spanish food and drink specialties will help fill you up whilst keeping you cool. ¡Buen provecho! (Enjoy your meal).
Our Ceiling, Their Floor, Educating the Future
Throughout this blog series, we’ve been discussing the future of tech in relation to our young people. At Akamai, our outreach programs and forward-thinking culture have positioned us as part of the movement determined to make the world better for…
16Shop: Commercial Phishing Kit Has A Hidden Backdoor
Additional research by Or Katz When it comes to targeting Apple users and their personal and financial data, 16Shop has emerged as a go to kit for those who can afford it. While 16Shop is sold to criminals looking to…
Kali Linux 2019.2 Release
Welcome to our second release of 2019, Kali Linux 2019.2, which is available for immediate download. This release brings our kernel up to version 4.19.28, fixes numerous bugs, includes many updated packages, and most excitingly, features a new release …
No One Seems To Feel Bad About Nigel Farage Getting Hit With A Milkshake
Far-right British politician Nigel Farage received a sticky cold shower on Monday, much to the internet’s collective glee. The Brexit…
Egged Australian Senator Who Blamed Muslims For NZ Shootings Loses Election
Fraser Anning, the far-right Australian senator who blamed Muslim immigrants for the New Zealand mosque shootings, was voted out of…
Preventing the Top Data Center Breaches
Data center breaches can seem impossible to avoid, but good data center security can seriously reduce your risk. We look at famous breaches Equifax, Yahoo, & more.
Bots Tampering with TLS to Avoid Detection
Researchers at Akamai observed attackers using a novel approach for evading detection. This new technique – which we call Cipher Stunting – has become a growing threat, with its roots tracing back to early-2018. By using advanced methods, attackers are…
Containers vs Virtual Machines ? Your Cheat Sheet to Know the Differences
Containers vs virtual machines is an ongoing debate in many IT shops around the world. Learn what makes each unique, their common use cases, and how to keep both secure.