IoT has tremendous possibilities to transform our world but will fall short of expectations if the underlying infrastructure cannot support the rapid exchange of massive amounts of information from billions of simultaneous and intermittent connections….
ATA 8.0 Graduation Ceremony
Akamai Technical Academy is a training program designed for people who have an interest and aptitude for technology but may not come from a traditional technical background. Up until now, we have successfully onboarded over 140 incredible people in thr…
5G, Security, IoT, Asavie, and Akamai
Malicious actors never rest and have always worked remotely. That simple realization hit home during recent global events. Specifically, Akamai saw an increase in malware traffic of over 400% between March 9 and May 11, 2020 from corporate devices, mos…
Catch Me if You Can?JavaScript Obfuscation
While conducting threat research on phishing evasion techniques, Akamai came across threat actors using obfuscation and encryption, making the malicious page harder to detect. The criminals were using JavaScript to pull this off….
MITRE ATT&CK Tactics Are Not Tactics
Just what are “tactics”?IntroductionMITRE ATT&CK is a great resource, but something about it has bothered me since I first heard about it several years ago. It’s a minor point, but I wanted to document it in case it confuses anyone else.The MI…
Philippine Army’s Light Tank and Wheeled APC projects awarded to Israel’s Elbit Systems
With the Philippines looking at reopening itself to business despite COVID-19 pandemic still ongoing, it looks like the Department of National Defense (DND) and the Armed Forces of the Philippines (AFP are doing the same now.As the Department of Budget…
2020 DDoS Extortion Campaign — A Sequel More Thrilling Than the Original
As the go-to enterprise distributed denial-of-service (DDoS) mitigation experts, our phones have been “ringing off the hook” since the release of the global extortion DDoS campaign sequel. This latest installment of the cybersecurity saga is bigger, ba…
Can Edge Computing Exist Without the Edge? Part 1: The Edge
If the title sounds like a trick question, it really depends on who you ask. Semantically, it seems clear that if you take the “edge” and combine it with “computing” you get edge computing. But if you have been reading headlines, you would be justified…
Thales launches small AESA radar for small aircraft
The French defense ministry wants the AirMaster C sensor for its future Guépard helicopter, according to the company.
DDoS Extortion Examination
In terms of the Distributed Denial of Service (DDoS) landscape, 2020 was almost boring prior to the beginning of August. The excitement from the record peak Gbps and Mpps seen in early summer had worn off, and we weren’t seeing…