This blog post provides an overview of a vulnerability discovered in Akamai’s Enterprise Application Access (EAA) product which has been patched.
Akamai EAA Impersonation Vulnerability – A Deep Dive
In this post, we cover the technical details of CVE-2021-28091, the vulnerability impacting Akamai’s Enterprise Application Access (EAA) platform.
The Rapid Resurgence of DDoS Extortion (That Didn’t Take Long)
Just when we thought DDoS extortion was fading into the rearview mirror, it’s time to circle up the trucks again (gas tanks full).
Kali Linux 2021.2 Release (Kaboxer, Kali-Tweaks, Bleeding-Edge & Privileged Ports)
Say hello to Kali Linux 2021.2! This release welcomes a mixture of new items as well as enhancements of existing features, and is ready to be downloaded (from our updated page) or upgraded if you have an existing Kali Linux installation.
A quick summar…
5 Benefits of Network Segmentation
Learn more about how microsegmentation can enable you to achieve granular network segmentation, quickly and securely.
Keeping Phishing Simulations on Track
The West Midlands Train service has come under fire after workers discovered that an email promising them a bonus payment after running trains during the pandemic was actually a phishing simulation test. Around 2,500 employees received a message which …
How to Be an Effective, Remote Leader
I’ve been working remotely for 10 years. Probably one of the biggest challenges an executive faces today is how to be a leader in a remote work environment. This predicament (and weakness) alone can cause a rift between companies and employees who have become accustomed to the work-at-home model and have been required to return to […]
The post How to Be an Effective, Remote Leader appeared first on Massive Alliance.
Edge DNS Secondary Implementation: Order of Operations for NS Zone and Registrar Records
Akamai Edge DNS service delivers edge-based, authoritative domain services for thousands of organizations.
How Hidden Vulnerabilities will Lead to Mobile Device Compromises
Your mobile device can be hacked very easily without your knowledge. Even if an attacker can’t get into your device they can attempt to gain access to the sensitive information instead that is stored inside such as your places visited, emails and conta…
ThinkPHP Exploit Actively Exploited in the Wild
Blog Blog https://www.akamai.com/blog CySecBot CySecBot