Disclaimer: This post isn’t our usual security-focused content – today we’re taking a quick detour to explore the fascinating world of AI agents with the focus of AI web agents. Enjoy this educational dive as a warm-up before we get…
Tag: Blog
The Rise of Agentic AI: Uncovering Security Risks in AI Web Agents
In our first post, we introduced the world of AI web agents – defining what they are, outlining their core capabilities, and surveying the leading frameworks that make them possible. Now, we’re shifting gears to look at the other side…
Dangling Danger: Why You Need to Focus on Your DNS Posture Management
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Dangling Danger: Why You Need to Focus on Your DNS Posture Management
Closing the Loop on API Security: How Imperva Helps You Expose, Contain, and Mitigate Business Logic Threats
In a world powered by APIs, waiting for an attack is waiting too long. Business logic risks like Broken Object Level Authorization (BOLA) don’t announce themselves with obvious signatures or malware. They hide in plain sight within normal-looking traffic and…
Study Reveals API Security Gaps in Asia-Pacific Compliance Programs
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Study Reveals API Security Gaps in Asia-Pacific Compliance Programs
Keep Your Tech FLAME Alive: Akamai Trailblazer Maite Vitar
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Keep Your Tech FLAME Alive: Akamai Trailblazer Maite Vitar
Cryptominers? Anatomy: Shutting Down Mining Botnets
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Cryptominers? Anatomy: Shutting Down Mining Botnets
Improve Your Security with Attack Insights in Web Security Analytics
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Improve Your Security with Attack Insights in Web Security Analytics
CVE-2025-49763 – Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin
Remote attackers can trigger an avalanche of internal ESI requests, exhausting memory and causing denial-of-service in Apache Traffic Server. Executive Summary Imperva’s Offensive Security Team discovered CVE-2025-49763, a high-severity vulnerability (CVSS v3.1 estimated score: 7.5) in Apache Traffic Server’s ESI…
Building a Quantum-Safe Internet: The IETF’s Plan for TLS
Learn about the latest initiatives in post-quantum cryptography, including the IETF?s plan for securing TLS. This article has been indexed from Blog Read the original article: Building a Quantum-Safe Internet: The IETF’s Plan for TLS
Enhancements to Akamai API Security, Q2 2025
Akamai API Security updates 3.48 and 3.49 include Compliance Dashboard enhancements, integration with Zuplo API gateway, and expanded sensor coverage. This article has been indexed from Blog Read the original article: Enhancements to Akamai API Security, Q2 2025
API Security Under Federal Scrutiny: A Wake-Up Call for CIOs
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: API Security Under Federal Scrutiny: A Wake-Up Call for CIOs
Secure Your Enterprise with Robust DNS: A Guide to NIST SP 800-81r3
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Secure Your Enterprise with Robust DNS: A Guide to NIST SP 800-81r3
Beyond Implementation: Building a Zero Trust Strategy That Works
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Beyond Implementation: Building a Zero Trust Strategy That Works
Enhance Your Edge Native Apps with Low Latency Using Multiple EdgeWorkers
Learn how Flexible Composition lets you seamlessly deploy multiple EdgeWorkers in a single request for easier-to-build, scalable, edge native applications. This article has been indexed from Blog Read the original article: Enhance Your Edge Native Apps with Low Latency Using…
Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability
Innovation, Not Infrastructure: Akamai?s Managed Cloud Services
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Innovation, Not Infrastructure: Akamai?s Managed Cloud Services
Navigating the Future of Scope 2: Balancing Impact and Practicality
The Greenhouse Gas Protocol?s Scope 2 revisions demand thoughtful action. Read how we?re prioritizing meaningful, measurable impact over rapid progress. This article has been indexed from Blog Read the original article: Navigating the Future of Scope 2: Balancing Impact and…
Fog Computing vs. Edge Computing: Their Roles in Modern Technology
Fog computing vs. edge computing: Understand how they compare, their unique benefits, and which is best for your data processing needs in IoT and beyond. This article has been indexed from Blog Read the original article: Fog Computing vs. Edge…
Why It?s Time to Retire Traditional VPNs, Part 1
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Why It?s Time to Retire Traditional VPNs, Part 1