While recently looking over my honeypots, I discovered an infection where a malicious actor added a storefront on top of my existing WordPress installation. For background, this particular honeypot is a full instance of WordPress running on a Docker im…
Toward Inclusive Language in Software
Blog Blog https://www.akamai.com/blog CySecBot CySecBot
Kali Linux 2020.4 Release (ZSH, Bash, CME, MOTD, AWS, Docs, Win-KeX & Vagrant)
We find ourselves in the 4th quarter of 2020, and we are ecstatic to announce the release of Kali Linux 2020.4, which is ready for immediate download or updating.
What’s different with this release since 2020.3 in August 2020 is:
ZSH is the new …
The dangers of firewall misconfigurations
Blog Blog https://www.akamai.com/blog CySecBot CySecBot
Ecobee vs Nest – Which One is Better [Our COMPREHENSIVE Guide Before You Buy]
Looking for a thermostat to control your home climate while minimizing energy cost? You should consider a smart thermostat! Smart thermostats conveniently maximize your home’s energy efficiency while empowering you to monitor and control t…
Safeguard Identity Data at the Source
When your customers create an account on your website or application, they are entrusting their valuable information with you in order to establish a relationship. To maintain that relationship, they need to have faith that you will protect their infor…
Akamai Wellness in APJ
Creating the world’s best and most secure digital experience demands the very best industry talent. But as a responsible employer, we also understand how important it is to play our part in looking after those brilliant minds.
Redundant, Secure, and Open Short Domains: A Vision for Multi-Provider Apex Domain Aliases to Enable DNS Diversity
Human nature is to seek simpler and convenient ways to do things. One example is the sometimes onerous task of typing a URL into a web browser’s address bar. Since users prefer short, easy-to-remember URLs, an internet trend is to use short domains for…
A New Skimmer Uses WebSockets and a Fake Credit Card Form to Steal Sensitive Data
A new skimmer attack was discovered this week, targeting various online e-commerce sites built with different frameworks. As I write this blog post, the attack is still active and exfiltrating data.
New Book! The Best of TaoSecurity Blog, Volume 3
Introduction I published a new book!The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices is the third title in the TaoSecurity Blog series. It’s in the Kindle Store, and if you have an Unlimi…