Modern application environments are dynamic, distributed, and moving faster than ever. DevOps teams deploy new services daily, APIs multiply across regions, and traffic fluctuates by the hour. At the same time, organizations must uphold security, compliance, and availability without slowing…
Category: Blog
Why Separating Control and Data Planes Matters in Application Security
Modern application environments are dynamic, distributed, and moving faster than ever. DevOps teams deploy new services daily, APIs multiply across regions, and traffic fluctuates by the hour. At the same time, organizations must uphold security, compliance, and availability without slowing…
Critical Flaws in Base44 Exposed Sensitive Data and Allowed Account Takeovers
Our research uncovered multiple critical vulnerabilities in Base44, an AI-powered platform that lets you turn any idea into a fully functional custom app. These flaws ranged from an open redirect that leaked access tokens, to stored cross-site scripting (XSS), insecure…
Marginal Emissions Rates: See Carbon Emissions with Clarity in Real Time
Learn how Akamai is using marginal emissions rates to improve the transparency and accuracy of our emissions accounting. This article has been indexed from Blog Read the original article: Marginal Emissions Rates: See Carbon Emissions with Clarity in Real Time
A New Way to Manage Property Configurations: Dynamic Rule Updates
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: A New Way to Manage Property Configurations: Dynamic Rule Updates
Smuggling Requests with Chunked Extensions: A New HTTP Desync Trick
A new HTTP request smuggling technique was recently discovered, where attackers take advantage of inconsistent parsing behaviors between front-end proxy servers and back-end application servers. This attack technique leverages ambiguous request formatting to inject malicious secondary requests that appear after…
Stop LLM Attacks: How Security Helps AI Apps Achieve Their ROI
AI security is a business problem. Protect your LLM application investment and ROI by connecting your security team with business stakeholders. This article has been indexed from Blog Read the original article: Stop LLM Attacks: How Security Helps AI Apps…
Akamai Beats Other WAAP Vendors in Third-Party Evaluation
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai Beats Other WAAP Vendors in Third-Party Evaluation
QUIC-LEAK (CVE-2025-54939): New High-Risk Pre-Handshake Remote Denial of Service in LSQUIC QUIC Implementation
Imperva Offensive team discovered that threat actors could smuggle malformed packets to exhaust memory and crash QUIC servers even before a connection handshake is established, therefore, bypassing QUIC connection-level safeguards. Executive Summary QUIC-LEAK (CVE-2025-54939) is a newly discovered pre-handshake memory…
Accelerating Secure Enterprise Kubernetes Adoption
Learn how LKE-E solves critical problems while providing streamlined adoption, operational simplicity, and cost efficiency at scale. This article has been indexed from Blog Read the original article: Accelerating Secure Enterprise Kubernetes Adoption
Akamai Named an Overall Leader for API Security by KuppingerCole
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai Named an Overall Leader for API Security by KuppingerCole
The Reality of Modern Cyberattacks: Lessons from Recent Retail Breaches
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Reality of Modern Cyberattacks: Lessons from Recent Retail Breaches
Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming
Discover how Akamai and Bitmovin?s partnership reduces costs, enhances performance, and delivers personalized video experiences to content providers. This article has been indexed from Blog Read the original article: Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming
MadeYouReset: Turning HTTP/2 Server Against Itself
Introduction HTTP/2 was designed for performance- faster multiplexed connections, stream prioritization, and header compression. But these same features have also opened the door for sophisticated denial-of-service attacks. Back in 2023, the HTTP/2 Rapid Reset vulnerability made headlines after attackers exploited…
Navigating the API Security Landscape: Your Definitive API Security Buyer’s Guide for 2025
APIs power today’s digital economy—connecting customers, partners, and internal services at breakneck speed. But with that agility comes risk: in 2024 alone, API vulnerabilities cost organizations a staggering $2.5 billion in remediation, fines, and lost revenue. As APIs proliferate, traditional…
From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security
Visualize Security Success with the Security Summary Dashboard
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Visualize Security Success with the Security Summary Dashboard
Imperva Detects and Mitigates Rejetto HFS Spray-and-Pray Ransomware/Trojan Campaign
On July 19th, Imperva Threat Research team detected a sudden surge in HTTP probes targeting Rejetto HTTP File Server (HFS) 2.x instances. What looked like routine internet noise quickly revealed itself as a coordinated attempt to exploit a critical unauthenticated…
CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding
In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for all customers. This article has been indexed from Blog Read the original article: CVE-2025-32094: HTTP Request Smuggling Via OPTIONS +…
Post-Quantum Cryptography Implementation Considerations in TLS
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Post-Quantum Cryptography Implementation Considerations in TLS