This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: From VPN to Zero Trust: Why It?s Time to Retire Traditional VPNs,…
Category: Blog
An Intentionally Engineered Platform for a More Responsible Internet
Learn how Akamai delivers performance, security, and scale on a platform that’s also built for sustainability. This article has been indexed from Blog Read the original article: An Intentionally Engineered Platform for a More Responsible Internet
CVE-2025-5777 Exposes Citrix NetScaler to Dangerous Memory Leak Attacks
The cybersecurity community is once again sounding the alarm over a new vulnerability in Citrix NetScaler devices- this time, it’s CVE-2025-5777, also dubbed CitrixBleed 2. Following in the footsteps of the high-profile CitrixBleed vulnerability (CVE-2023-4966) disclosed in 2023, this newly…
How AI Bots Are Rewriting the Rules of Publishing
See how AI bots impact publishers and how Akamai helps you protect, control, and monetize your content as AI reshapes how people find information. This article has been indexed from Blog Read the original article: How AI Bots Are Rewriting…
Protect Client-Side Code and Certify the Authenticity of Data Collection
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Protect Client-Side Code and Certify the Authenticity of Data Collection
Hijacking Ollama’s Signed Installer for Code Execution
This blog post is part of an ongoing series exploring how AI related tools aimed at developers can be exploited to compromise their machines. As these tools increasingly integrate deep system access, they also expand the attack surface available to…
Behind the Booking: How Bots Are Undermining Airline Revenue
The airline industry is under constant attack from malicious bots. Bad actors use automation to scrape fares, hoard inventory, commit fraud, and compromise customer accounts. While every airline faces its own unique challenges, the business impacts are remarkably consistent—lost revenue,…
Elastic WAF: Reshaping Application Security for DevOps and Hybrid Environments
We recently discussed Imperva’s vision for the future of application security, where we also covered the Imperva Security Engine. This innovative application security framework is powering up the next generation of Imperva solutions, the first of which is Imperva Elastic…
Operationalize Day-2 Services for API Security and Microsegmentation
Learn how to turn post-deployment services into a revenue opportunity and provide ongoing value for your customers with industry-leading tools and service playbooks. This article has been indexed from Blog Read the original article: Operationalize Day-2 Services for API Security…
Commitment to Powering Europe?s Digital Sovereignty and Competitiveness
Akamai remains committed to supporting our customers? European digital sovereignty with our suite of robust, secure, and high-performing solutions. This article has been indexed from Blog Read the original article: Commitment to Powering Europe?s Digital Sovereignty and Competitiveness
The Rise of Agentic AI: From Chatbots to Web Agents
Disclaimer: This post isn’t our usual security-focused content – today we’re taking a quick detour to explore the fascinating world of AI agents with the focus of AI web agents. Enjoy this educational dive as a warm-up before we get…
The Rise of Agentic AI: Uncovering Security Risks in AI Web Agents
In our first post, we introduced the world of AI web agents – defining what they are, outlining their core capabilities, and surveying the leading frameworks that make them possible. Now, we’re shifting gears to look at the other side…
Dangling Danger: Why You Need to Focus on Your DNS Posture Management
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Dangling Danger: Why You Need to Focus on Your DNS Posture Management
Closing the Loop on API Security: How Imperva Helps You Expose, Contain, and Mitigate Business Logic Threats
In a world powered by APIs, waiting for an attack is waiting too long. Business logic risks like Broken Object Level Authorization (BOLA) don’t announce themselves with obvious signatures or malware. They hide in plain sight within normal-looking traffic and…
Study Reveals API Security Gaps in Asia-Pacific Compliance Programs
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Study Reveals API Security Gaps in Asia-Pacific Compliance Programs
Keep Your Tech FLAME Alive: Akamai Trailblazer Maite Vitar
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Keep Your Tech FLAME Alive: Akamai Trailblazer Maite Vitar
Cryptominers? Anatomy: Shutting Down Mining Botnets
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Cryptominers? Anatomy: Shutting Down Mining Botnets
Improve Your Security with Attack Insights in Web Security Analytics
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Improve Your Security with Attack Insights in Web Security Analytics
CVE-2025-49763 – Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin
Remote attackers can trigger an avalanche of internal ESI requests, exhausting memory and causing denial-of-service in Apache Traffic Server. Executive Summary Imperva’s Offensive Security Team discovered CVE-2025-49763, a high-severity vulnerability (CVSS v3.1 estimated score: 7.5) in Apache Traffic Server’s ESI…
Building a Quantum-Safe Internet: The IETF’s Plan for TLS
Learn about the latest initiatives in post-quantum cryptography, including the IETF?s plan for securing TLS. This article has been indexed from Blog Read the original article: Building a Quantum-Safe Internet: The IETF’s Plan for TLS