Tag: Akamai
CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...
Breaking News
New Tool Shields Organizations From NXDOMAIN Attacks
Attacks against the Domain Name System (DNS) are numerous and varied, so organizations have to rely on layers of protective measures, such as traffic...
NSA’s Zero-Trust Guidelines Focus on Segmentation
The US National Security Agency (NSA) delivered its guidelines for zero-trust network security this week, offering a more concrete roadmap towards zero-trust adoption. It's...
FritzFrog Botnet Exploits Log4Shell on Overlooked Internal Hosts
A new variant of an advanced botnet called "FritzFrog" has been spreading via Log4Shell.It's been more than two years since the critical vulnerability in...
In Cybersecurity and Fashion, What’s Old Is New Again
COMMENTARYWhile distributed denial-of-service (DDoS) attacks and zero-day threats are nothing new in cybersecurity, they're still happening regularly for a simple reason: They work. In...
Black Hat Europe 2023 Closes on Record-Breaking Event in London
PRESS RELEASELONDON, Dec. 20, 2023 — Black Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the successful completion of...
US States Seek Ways to Help Communities Build Cyber Defenses
As CISO for the state of North Dakota, Michael Gregg says that one of his first duties was meeting with the North Dakota Insurance...
Microsoft Outlook Zero-Click Security Flaws Triggered by Sound File
Researchers this week disclosed details on two security vulnerabilities in Microsoft Outlook that, when chained together, give attackers a way to execute arbitrary code...
Patch Now: Exploit Activity Mounts for Dangerous Apache Struts 2 Bug
Concerns are high over a critical, recently disclosed remote code execution (RCE) vulnerability in Apache Struts 2 that attackers have been actively exploiting over...
Tips for Modernizing SecOps Teams
The security operations center is the enterprise’s first line of defense against an active attack. It is also the base of all security operations,...
Russian Espionage Group Hammers Zero-Click Microsoft Outlook Bug
An espionage group linked to the Russian military continues to use a zero-click vulnerability in Microsoft Outlook in attempts to compromise systems and gather...
Web Shells Gain Sophistication for Stealth, Persistence
Web shells, a common type of post-exploitation tool that provides easy-to-use interface through which to issue commands to a compromised server, have become increasingly...
CacheFly Emerges as Premier CDN Choice Amidst Industry Consolidation
In the wake of major CDN acquisitions by Akamai, CacheFly stands out as the go-to alternative, offering businesses unmatched speed, reliability, and customer-first flexibility....