Category: Blog

Protect and Elevate Your DNS with Akamai Shield NS53

Learn how Akamai Shield NS53 can protect your capital investment into on-premises DNS infrastructure and significantly improve performance. This article has been indexed from Blog Read the original article: Protect and Elevate Your DNS with Akamai Shield NS53

Why Game Companies Are Adopting Distributed Cloud Computing

Global game developers are providing improved performance, better in-game experiences, and boosting gamer retention with distributed cloud computing. This article has been indexed from Blog Read the original article: Why Game Companies Are Adopting Distributed Cloud Computing

The Importance of Bot Management in Your Marketing Strategy

Marketing teams need a comprehensive bot management solution to address the challenges posed by bot traffic and protect marketing analytics. Bot management is designed to protect marketing efforts from bot-generated invalid traffic by accurately and efficiently classifying traffic and stopping…

How to Defend Against Relentless DNS Attacks

Enterprise organizations, their employees, and their customers are better protected from cyberattacks when their DNS is properly secured. This article has been indexed from Blog Read the original article: How to Defend Against Relentless DNS Attacks

API Security and The Silent Menace of Unknown APIs

The digital application landscape is evolving rapidly, with APIs as the backbone of modern software development. However, amidst all this innovation lies a silent menace:  the prevalence of unknown APIs. These APIs, often lurking beyond sanctioned channels, pose significant security…

The Crucial Role of Data in Sustainability

Akamai?s data has the potential to help us address one of the most significant challenges of our time: climate change. This article has been indexed from Blog Read the original article: The Crucial Role of Data in Sustainability

5 Steps to Make Zero Trust Achievable

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: 5 Steps to Make Zero Trust Achievable

The CISO’s Top Priority: Elevating Data-Centric Security

The shift to cloud computing has enhanced the resilience and security of most organizations. In this era of unparalleled agility and scalability, data-centric security can offer transformational opportunities for Chief Information Security Officers (CISOs) to improve data protection, compliance, and…

Taking Time to Understand NIS2 Reporting Requirements

The newest version of the European Union Network and Information Systems directive, or NIS2, came into force in January 2023. Member States have until October 2024 to transpose it into their national law. One of the most critical changes with…

The 8 Most Common Causes of Data Breaches

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The 8 Most Common Causes of Data Breaches

Five Key Takeaways from the 2024 Imperva Bad Bot Report

Bad bots continue to affect consumers and organizations across all sectors. For over eleven years, Imperva has been dedicated to helping organizations manage and mitigate the threat of bad bots. We’ve published the 2024 Imperva Bad Bot Report as part…

HTTP/2 CONTINUATION Flood Vulnerability

HTTP/2, a widely adopted web communication protocol, organizes data transmission through a binary framing layer, wherein all communication is divided into smaller messages called frames, each identified by a specific type, such as headers, data, and continuation frames. HTTP/2 HEADER…

From ChatBot To SpyBot: ChatGPT Post Exploitation

In the second installment of our blog post series on ChatGPT, we delve deeper into the security implications that come with the integration of AI into our daily routines. Building on the discoveries shared in our initial post, “XSS Marks…

Why it Pays to Have a Comprehensive API Security Strategy

In an era dominated by digital connectivity and rapid technological advancements, Application Programming Interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between diverse software applications. As API usage continues to grow, so does the need…

Learning from the LockBit Takedown

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Learning from the LockBit Takedown

Advocating for Inclusion in Tech

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Advocating for Inclusion in Tech

Attackers Quick to Weaponize CVE-2023-22527 for Malware Delivery

On January 16, 2024, Atlassian disclosed a critical vulnerability affecting Confluence Data Center and Confluence Server, tracked as CVE-2023-22527. The vulnerability is an unauthenticated OGNL injection bug, allowing unauthenticated attackers to execute Java expressions, invoke methods, navigate object relationships, and…

XSS Marks the Spot: Digging Up Vulnerabilities in ChatGPT

With its widespread use among businesses and individual users, ChatGPT is a prime target for attackers looking to access sensitive information. In this blog post, I’ll walk you through my discovery of two cross-site scripting (XSS) vulnerabilities in ChatGPT and…

Hacking Microsoft and Wix with Keyboard Shortcuts

Browser vendors continuously tweak and refine browser functionalities to improve security. Implementing same-site cookies is a prime example of vendors’ efforts to mitigate Cross-Site Request Forgery (CSRF) attacks. However, not all security measures are foolproof. In their quest to combat…

The Added Value of SNI-Only Mode in Imperva Cloud WAF

Imperva has modified the default behavior for new cloud WAF sites, now enforcing Server Name Indication (SNI)-only traffic by default. This shift is aimed at optimizing the utilization of TLS-related features, both those currently in place and those slated for…

Do Any HTTP Clients Not Support SNI?

In this blog post, we’ll share the results of an internal research project we conducted on our CDN customers focused on websites that are getting non-Server Name Indication (SNI) traffic.  The goal of our research was to answer the following…