I?m excited to announce our new all-inclusive Learning Hub as the single destination for all product learning resources at Akamai. This new Hub gives users the ability to choose the method of learning that suits them best, whether that?s reading throug…
Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)
Today we have released the newest version of Kali Linux, 2021.3 (quarter #3), which is now ready for download or updating.
A summary of the changes since the 2021.2 release from June are:
OpenSSL – Wide compatibility by default – Keep reading for what…
Prevention is Better Than Cure: The Ransomware Evolution
Ransomware tactics have continued to evolve over the years, and remain a prominent threat to both SMBs and larger organisations. Particularly during the peak of COVID-19, research by IBM found that ransomware incidents ‘exploded’ in June 2020…
Jest Mocks?Unit Testing for EdgeWorkers
In case you haven?t already been working with EdgeWorkers, it allows you to run JavaScript code across more than 4,200 locations for proximity to users and fast application response times.
With more and more application functionality moving to the edg…
Holiday Readiness, Part Two: What you Should be Thinking About Three Months Out?Capacity Planning
Welcome back to the Holiday Readiness blog series. We hope part one has kept you busy over the past month as you continue to improve your security posture. If you haven?t finished all of the security checklist items, don?t worry ? there is still time b…
Passwords ? Extinction Event Looming?
Passwords are the bane of users and security teams? lives. Despite years of security teams educating users about not using 123456 as a password, not recycling passwords across multiple personal and professional accounts, and implementing even more rigo…
UPX Packed Headaches
Researching malware has many challenges. One of those challenges is obfuscated code and intentionally corrupted binaries. To address challenges like this, we’ve written a small tool in C that could fix intentionally corrupted binaries automatically. W…
Dogged Persistence?The Name of the Game for One DDoS Attacker
With DDoS, we typically observe a moderate degree of attacker persistence. DDoS attacks are relatively easy to launch from a number of online booter services, and the availability of cryptocurrencies for payment has made it easy to remain anonymous. At…
The Top 10 Safest Colleges in Texas
College-Bound Freshmen: See Which Colleges are the Safest in Your State in 2020 Living in Texas certainly has its perks. Between year-round warm weather, a low cost of living, tons of post-college job opportunities, and TexMex everywhere, there a…
Tokyo Streaming Traffic Runs Rings Around Rio
With 35 medals at stake, the last full day of competition during the games in Tokyo generated the highest video streaming traffic for 30-plus customers on the Akamai Intelligent Edge Platform. Medal matches for baseball, basketball, and soccer, along w…