Category: Blog

Imperva Protects Against Apache Tomcat Deserialization Vulnerability

Overview  A newly disclosed vulnerability, CVE-2025-24813, affecting Apache Tomcat, has been identified as a high-risk path equivalence vulnerability that allows attackers to manipulate filenames with internal dots (.) under specific conditions, leading to unauthorized file access, modification, and potential remote…

Imperva Protects Against the Apache Camel Vulnerabilities

Introduction: Understanding the Apache Camel Flaw On March 9, 2025, Apache released a security advisory for CVE-2025-27636, a vulnerability in the Apache Camel framework that allows attackers to bypass header filtering via miscased headers. Although rated as moderate, this vulnerability…

Detecting and Mitigating the Apache Camel Vulnerabilities

Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891. This article has been indexed from Blog Read the original article: Detecting and Mitigating the Apache Camel Vulnerabilities

Lightning-Fast Requests with Early Data

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Lightning-Fast Requests with Early Data

Cryptominers? Anatomy: Cryptomining Internals

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Cryptominers? Anatomy: Cryptomining Internals

Continuing the Sustainability Conversation

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Continuing the Sustainability Conversation

Akamai: Supporting Chinese Enterprises in Global Expansion

China is a cornerstone of Akamai?s operations and we view ourselves as partners with Chinese businesses as they navigate the complexities of a global economy. This article has been indexed from Blog Read the original article: Akamai: Supporting Chinese Enterprises…

DNS Silently Powers the Internet

As a part of almost every internet transaction, the Domain Name System is powerful, lightweight, and ubiquitous ? and delivers value for a modest investment. This article has been indexed from Blog Read the original article: DNS Silently Powers the…

Akamai API Security Release 3.41

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai API Security Release 3.41

Akamai?s Tailored Approach to Net Zero

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai?s Tailored Approach to Net Zero

Data Security: Challenges, Solutions, and the Path Forward

Learn why a more proactive, integrated, and dynamic approach to data security is crucial to effectively safeguard your business in today?s digital landscape. This article has been indexed from Blog Read the original article: Data Security: Challenges, Solutions, and the…

Imperva’s Wildest 2025 AppSec Predictions

Humans are spectacularly bad at predicting the future. Which is why, when someone appears to be able to do it on a regular basis, they are hailed as visionaries, luminaries and celebrated with cool names like Nostradamus and The Amazing…

Major Enhancements to Akamai API Security, Q4 2024

The Akamai API Security updates 3.38, 3.39, and 3.40 include configurable blocking, the automatic creation of posture findings from runtime incidents, and more. This article has been indexed from Blog Read the original article: Major Enhancements to Akamai API Security,…

DigiEver Fix That IoT Thing!

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: DigiEver Fix That IoT Thing!

Bot Reporting: 4 Key Differences to Consider

Get a detailed look at Akamai?s bot reporting and the important advantages it offers to organizations that are looking to improve their bot defenses. This article has been indexed from Blog Read the original article: Bot Reporting: 4 Key Differences…

The Shift to the Edge Continues to Accelerate

The IDC MarketScape report evaluated providers in the edge delivery services category. Read why Akamai was chosen as a Leader. This article has been indexed from Blog Read the original article: The Shift to the Edge Continues to Accelerate

Imperva Defends Against LLM Hacking

In the evolving landscape of cybersecurity, the advent of large language models (LLMs) has introduced a new frontier of challenges and opportunities. Research has shown advanced LLMs, such as GPT-4, now possess the ability to autonomously execute sophisticated cyberattacks, including…

Segmenting Hybrid Clouds: What to Look for in a Solution

Learn how to select a microsegmentation solution to fortify your organization?s cloud security strategies and protect your assets across multiple public clouds. This article has been indexed from Blog Read the original article: Segmenting Hybrid Clouds: What to Look for…

Meet Andy Zollo, SVP of APJ Sales

Andy Zollo, who led the Imperva business in EMEA, relocated to Singapore in October to be Senior Vice President of Sales for the combined Imperva and Thales CPL businesses in the APJ region. With a wealth of experience in sales…