Category: Blog

Imperva Protects Against Apache Tomcat Deserialization Vulnerability

Overview  A newly disclosed vulnerability, CVE-2025-24813, affecting Apache Tomcat, has been identified as a high-risk path equivalence vulnerability that allows attackers to manipulate filenames with internal dots (.) under specific conditions, leading to unauthorized file access, modification, and potential remote…

The Hidden Costs and Ethical Pitfalls of Content Scraping

Read about the significant hidden costs and ethical pitfalls of content scraping ? and learn how to protect your website. This article has been indexed from Blog Read the original article: The Hidden Costs and Ethical Pitfalls of Content Scraping

Imperva Protects Against the Apache Camel Vulnerabilities

Introduction: Understanding the Apache Camel Flaw On March 9, 2025, Apache released a security advisory for CVE-2025-27636, a vulnerability in the Apache Camel framework that allows attackers to bypass header filtering via miscased headers. Although rated as moderate, this vulnerability…

Negative Exposure: Edimax Network Cameras Used to Spread Mirai

Mirai continues to plague organizations. Read how the Akamai SIRT identified a new command injection vulnerability that?s targeting Edimax devices. This article has been indexed from Blog Read the original article: Negative Exposure: Edimax Network Cameras Used to Spread Mirai

Detecting and Mitigating the Apache Camel Vulnerabilities

Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891. This article has been indexed from Blog Read the original article: Detecting and Mitigating the Apache Camel Vulnerabilities

Why Are Airlines a Prime Target for Cyberattacks?

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Why Are Airlines a Prime Target for Cyberattacks?

Lightning-Fast Requests with Early Data

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Lightning-Fast Requests with Early Data

Strengthening Our Emissions Accounting Process Blog

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Strengthening Our Emissions Accounting Process Blog

Abusing VBS Enclaves to Create Evasive Malware

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Abusing VBS Enclaves to Create Evasive Malware

How to Comply with PCI DSS 4.0 Requirements 6.4.3 and 11.6.1

The countdown to compliance is in its final stretch. With the third and final phase of PCI DSS 4.0 requirements taking effect on March 31, 2025, organizations are under increasing pressure to ensure their client-side security measures meet the new…

Cryptominers? Anatomy: Cryptomining Internals

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Cryptominers? Anatomy: Cryptomining Internals

How Imperva Infused AI Throughout Research and Development

The Age of AI Is Upon Us The current pace of technological change beggars’ belief. Generative Artificial Intelligence (GenAI), released to the world a mere two years ago, promises to eliminate much of the tedium of the digital world. Software…

Active Exploitation: New Aquabot Variant Phones Home

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Active Exploitation: New Aquabot Variant Phones Home

Continuing the Sustainability Conversation

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Continuing the Sustainability Conversation

Akamai: Supporting Chinese Enterprises in Global Expansion

China is a cornerstone of Akamai?s operations and we view ourselves as partners with Chinese businesses as they navigate the complexities of a global economy. This article has been indexed from Blog Read the original article: Akamai: Supporting Chinese Enterprises…

DNS Silently Powers the Internet

As a part of almost every internet transaction, the Domain Name System is powerful, lightweight, and ubiquitous ? and delivers value for a modest investment. This article has been indexed from Blog Read the original article: DNS Silently Powers the…

Akamai API Security Release 3.41

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai API Security Release 3.41

Akamai?s Tailored Approach to Net Zero

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai?s Tailored Approach to Net Zero

Data Security: Challenges, Solutions, and the Path Forward

Learn why a more proactive, integrated, and dynamic approach to data security is crucial to effectively safeguard your business in today?s digital landscape. This article has been indexed from Blog Read the original article: Data Security: Challenges, Solutions, and the…

Making an Impact: Beach Cleanup and Reforestation Event

Akamai volunteers in Costa Rica came together to remove trash from the beach and plant trees ? and they learned how their everyday choices affect the planet. This article has been indexed from Blog Read the original article: Making an…

Imperva’s Wildest 2025 AppSec Predictions

Humans are spectacularly bad at predicting the future. Which is why, when someone appears to be able to do it on a regular basis, they are hailed as visionaries, luminaries and celebrated with cool names like Nostradamus and The Amazing…

Protecting Unmanaged Devices with Armis and Akamai

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Protecting Unmanaged Devices with Armis and Akamai

Major Enhancements to Akamai API Security, Q4 2024

The Akamai API Security updates 3.38, 3.39, and 3.40 include configurable blocking, the automatic creation of posture findings from runtime incidents, and more. This article has been indexed from Blog Read the original article: Major Enhancements to Akamai API Security,…

DigiEver Fix That IoT Thing!

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: DigiEver Fix That IoT Thing!

AVANT and Akamai: Solving Security Challenges for Financial Services

Read why AVANT?s Trusted Advisors recommend to their clients Akamai?s award-winning solutions in cloud computing, cybersecurity, and application protection. This article has been indexed from Blog Read the original article: AVANT and Akamai: Solving Security Challenges for Financial Services

The Benefits of Serverless Computing Architecture

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Benefits of Serverless Computing Architecture

Akamai?s Perspective on December?s Patch Tuesday 2024

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai?s Perspective on December?s Patch Tuesday 2024

Bot Reporting: 4 Key Differences to Consider

Get a detailed look at Akamai?s bot reporting and the important advantages it offers to organizations that are looking to improve their bot defenses. This article has been indexed from Blog Read the original article: Bot Reporting: 4 Key Differences…

The Economic Impact of Akamai Guardicore Segmentation

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Economic Impact of Akamai Guardicore Segmentation

The Shift to the Edge Continues to Accelerate

The IDC MarketScape report evaluated providers in the edge delivery services category. Read why Akamai was chosen as a Leader. This article has been indexed from Blog Read the original article: The Shift to the Edge Continues to Accelerate

Imperva Defends Against LLM Hacking

In the evolving landscape of cybersecurity, the advent of large language models (LLMs) has introduced a new frontier of challenges and opportunities. Research has shown advanced LLMs, such as GPT-4, now possess the ability to autonomously execute sophisticated cyberattacks, including…

Segmenting Hybrid Clouds: What to Look for in a Solution

Learn how to select a microsegmentation solution to fortify your organization?s cloud security strategies and protect your assets across multiple public clouds. This article has been indexed from Blog Read the original article: Segmenting Hybrid Clouds: What to Look for…

Akamai?s Perspective on November?s Patch Tuesday 2024

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai?s Perspective on November?s Patch Tuesday 2024

Meet Andy Zollo, SVP of APJ Sales

Andy Zollo, who led the Imperva business in EMEA, relocated to Singapore in October to be Senior Vice President of Sales for the combined Imperva and Thales CPL businesses in the APJ region. With a wealth of experience in sales…

Business Logic Attacks Target Election-Related Sites on Election Day

As U.S. citizens headed to the polls, cyber threat activity against election-related websites was unusually high. One of the most prominent attack types observed this Election Day was business logic attacks—a complex threat that manipulates the intended workflow of applications,…

The Definitive Guide to Linux Process Injection

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Definitive Guide to Linux Process Injection