Tag: Blog

Smuggling Requests with Chunked Extensions: A New HTTP Desync Trick

A new HTTP request smuggling technique was recently discovered, where attackers take advantage of inconsistent parsing behaviors between front-end proxy servers and back-end application servers. This attack technique leverages ambiguous request formatting to inject malicious secondary requests that appear after…

Stop LLM Attacks: How Security Helps AI Apps Achieve Their ROI

AI security is a business problem. Protect your LLM application investment and ROI by connecting your security team with business stakeholders. This article has been indexed from Blog Read the original article: Stop LLM Attacks: How Security Helps AI Apps…

Accelerating Secure Enterprise Kubernetes Adoption

Learn how LKE-E solves critical problems while providing streamlined adoption, operational simplicity, and cost efficiency at scale. This article has been indexed from Blog Read the original article: Accelerating Secure Enterprise Kubernetes Adoption

MadeYouReset: Turning HTTP/2 Server Against Itself

Introduction HTTP/2 was designed for performance- faster multiplexed connections, stream prioritization, and header compression. But these same features have also opened the door for sophisticated denial-of-service attacks. Back in 2023, the HTTP/2 Rapid Reset vulnerability made headlines after attackers exploited…

Introducing DataTrap: A Smarter, More Adaptive Honeypot Framework

Today, we’re excited to release DataTrap, a powerful, extensible honeypot system built to simulate realistic web applications, IoT devices, and database behavior across HTTP, HTTPS, SSH, and database protocols (e.g., MySQL). What sets DataTrap apart? It goes beyond static honeypots…

Surges in Cyber Activity Accompany Regional Military Operations

Geopolitical events and military operations often trigger a cascade of online activity, both legitimate and malicious. Recent data from our global threat network highlights the strong connection between military escalations and cyberattacks, with the latest example unfolding in the Middle…

Why Customer Experience Is the New Battleground in Zero Trust

Learn why being named a Customer Favorite in Forrester’s Zero Trust Wave reveals what we believe really matters in cybersecurity. This article has been indexed from Blog Read the original article: Why Customer Experience Is the New Battleground in Zero…

Optimizing Government Websites for Peak Traffic Events

Learn how to proactively withstand peak traffic events and improve your government website?s performance and security posture. This article has been indexed from Blog Read the original article: Optimizing Government Websites for Peak Traffic Events

From Cloudflare Bypass to Credit Card Theft

Introduction On July 6, 2025, a suspicious Python package called ‘cloudscrapersafe’ was uploaded to the Python Package Index (PyPI). Marketed as a utility to evade Cloudflare’s anti-bot protections, this package was a modified version of a widely used ‘cloudscraper’ library,…

CVE-2025-5777 Exposes Citrix NetScaler to Dangerous Memory Leak Attacks

The cybersecurity community is once again sounding the alarm over a new vulnerability in Citrix NetScaler devices- this time, it’s CVE-2025-5777, also dubbed CitrixBleed 2. Following in the footsteps of the high-profile CitrixBleed vulnerability (CVE-2023-4966) disclosed in 2023, this newly…

How AI Bots Are Rewriting the Rules of Publishing

See how AI bots impact publishers and how Akamai helps you protect, control, and monetize your content as AI reshapes how people find information. This article has been indexed from Blog Read the original article: How AI Bots Are Rewriting…

Behind the Booking: How Bots Are Undermining Airline Revenue

The airline industry is under constant attack from malicious bots. Bad actors use automation to scrape fares, hoard inventory, commit fraud, and compromise customer accounts. While every airline faces its own unique challenges, the business impacts are remarkably consistent—lost revenue,…

Hijacking Ollama’s Signed Installer for Code Execution

This blog post is part of an ongoing series exploring how AI related tools aimed at developers can be exploited to compromise their machines. As these tools increasingly integrate deep system access, they also expand the attack surface available to…

Real Performance Improvements 2025

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Real Performance Improvements 2025

Operationalize Day-2 Services for API Security and Microsegmentation

Learn how to turn post-deployment services into a revenue opportunity and provide ongoing value for your customers with industry-leading tools and service playbooks. This article has been indexed from Blog Read the original article: Operationalize Day-2 Services for API Security…

The Rise of Agentic AI: From Chatbots to Web Agents

Disclaimer: This post isn’t our usual security-focused content – today we’re taking a quick detour to explore the fascinating world of AI agents with the focus of AI web agents. Enjoy this educational dive as a warm-up before we get…

Cryptominers? Anatomy: Shutting Down Mining Botnets

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Cryptominers? Anatomy: Shutting Down Mining Botnets

Enhancements to Akamai API Security, Q2 2025

Akamai API Security updates 3.48 and 3.49 include Compliance Dashboard enhancements, integration with Zuplo API gateway, and expanded sensor coverage. This article has been indexed from Blog Read the original article: Enhancements to Akamai API Security, Q2 2025

Navigating the Future of Scope 2: Balancing Impact and Practicality

The Greenhouse Gas Protocol?s Scope 2 revisions demand thoughtful action. Read how we?re prioritizing meaningful, measurable impact over rapid progress. This article has been indexed from Blog Read the original article: Navigating the Future of Scope 2: Balancing Impact and…

Why It?s Time to Retire Traditional VPNs, Part 1

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Why It?s Time to Retire Traditional VPNs, Part 1

Introducing Akamai DNS Posture Management

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Introducing Akamai DNS Posture Management

Forget Perfect Prevention ? Build Cyber Resilience Instead

Discover why shifting from cyberattack prevention to cyber resilience is the key to survival in today?s relentless cyberthreat landscape. This article has been indexed from Blog Read the original article: Forget Perfect Prevention ? Build Cyber Resilience Instead

A DDoS Attack Just Breached Your Defenses ? Now What?

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: A DDoS Attack Just Breached Your Defenses ? Now What?

Redefining Application Security: Imperva’s Vision for the Future

It’s no secret that web applications have undergone a significant transformation over the past few years. The widespread adoption of containerization, serverless computing, low-code development, APIs, and microservices has redefined how applications are built, deployed, and scaled. According to Statista,…

AI Is Starting to Flex Its Network Security Muscles

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: AI Is Starting to Flex Its Network Security Muscles

A Sustainability Program with Regional Nuance

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: A Sustainability Program with Regional Nuance

Data Is on the Menu ? and AI?s Market Price Is High

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Data Is on the Menu ? and AI?s Market Price Is High