Akamai Akamai
Akamai® is the leading provider of cloud services for delivering, optimizing and securing online content and business applications.
https://www.stateoftheinternet.com/resources-web-security-threat-advisories-2015-xor-ddos-attacks-linux-botnet-malware-removal-ddos-mitigation-yara-snort.html Recently the Akamai Security Intelligence Response Team (SIRT) released its analysis of the XOR DDoS threat, Trojan malware used to infect and hijack Linux-based systems. Attacks from the XOR DDoS botnet have ranged from low, single-digit Gbps attacks to 150+ Gbps. Watch this brief slideshow for the fast facts, and then get detection and mitigation recommendations from the full XOR DDoS Threat Advisory at www.stateoftheinternet.com/xorddos.
The Onion Router (Tor) concept has provided anonymity for US Navy intelligence as well as individuals concerned with privacy or institutional censorship. Because it makes tracking the originating IP address nearly impossible, Tor has also attracted malicious actors exploiting anonymity to launch attacks on business websites. Akamai analysis of Tor traffic helps enterprises assess how to mitigate this risk, whether by total blocking or with enhanced scrutiny. See this brief slideshow for details on Akamai’s threat evaluation. For more information and statistics on web security, download the Q2 2015 State of the Internet – Security report at http://akamai.me/1kIdqzC
Massive Shellshock attacks and an increase in SQLi attacks characterized the web application attack landscape in the second quarter of 2015. For this quarter’s Security Report, Akamai analyzed nine common web application attack vectors, including Shellshock and SQLi as well as LFI, FRI, PHPi, CMDi, JAVAi, MFU, and XSS. See statistics and analysis and get information on attacks exploiting WordPress plugin vulnerabilities in this brief slideshow. For full details on these and other web security threats, download the Q2 2015 State of the Internet – Security report at http://akamai.me/1NeqxFl
For the third quarter in a row, DDoS attacks have doubled compared to the previous year. The total number of DDoS attacks observed in Q2 2015 set a record, as attacks became both more frequent and longer lasting. Find out the latest statistics and analysis on cybersecurity trends including attack volume and duration, DDoS attack patterns, targeted industries, this quarter’s multi-vector mega-attacks, and more. Watch this brief slideshow for the fast facts, and then get all the details from the full Q2 2015 State of the Internet – Security Report at http://bit.ly/1JSShXK.
In today’s business climate, your website is your brand, your public face and your business platform. Now imagine if attackers were to hijack your website and replace your content with something offensive, illegal, inflammatory or embarrassing. Website defacement, where attackers replace your website’s content so users see what the attackers want, can be devastating for your business. And these types of attacks are on the rise. Read this short article to learn more about this cloud security threat and then get all the details in the full Q1 2015 State of the Internet Security Report at http://bit.ly/1KfWTrG
DDoS attacks are on the rise, according to the Q1 2015 State Of The Internet - Security Report, with Akamai reporting a record number of DDoS attacks recorded on the PLXrouted network – more than double the number reported in the first quarter of 2014. However, the profile of the typical attack has changed, with attackers favoring relatively low-bandwidth attacks (typically less than 10 Gbps) but long durations (typically more than 24 hours). Get the fast facts in this presentation, and then get all the details from the full Q1 2015 State of the Internet – Security report at http://bit.ly/1KfWTrG.
Malicious actors continue to deploy SQL injection (SQLi) attacks to carry out their cybercriminal activities. The Threat Research team at Akamai designed a technique to categorize these attacks by examining attack payloads and determining the intent behind each attack. They analyzed 8 million SQLi attacks over a seven-day study period from Akamai's Kona Site Defender web application firewall (WAF) and distilled the information, identifying the observed attacks and their goals, as well as pertinent attack stats from the study. This presentation offers a quick view of the results. Get more details in the full State of the Internet Security Report at http://bit.ly/1KfWTrG
http://www.stateoftheinternet.com/resources-web-security-2015-q1-internet-security-report.html?utm_source=3rdParty.utm_medium=NationalPositions.utm_campaign=PRS-ARQ115-IPv6 As IPv4 exhaustion draws closer, more and more users are adopting IPv6. Despite many benefits of IPv6, the increase in address space creates new security vulnerabilities. Transition technologies that bridge IPv4 and IPv6 also have the potential to create security gaps. View this short presentation, and then get all the details from the full Q1 2015 State of the Internet – Security report at http://bit.ly/1fGly0N
Using data from the Akamai Intelligent PlatformTM, Akamai has developed a new analysis technique for web application layer botnets. By locating WAF triggers related to both Remote File Inclusion attacks and OS Command Injection attacks, researchers used aggregated results to map multiple botnets operating in the studied time period. Viewing the data in this manner yielded additional insight into the botnets and their respective capabilities. This presentation offers a summary of this technique as excerpted from the State of the Internet Q4 2014 Security Report. Watch this slideshow and then get more details at http://bit.ly/1GEbAZ9
Developers are employing bots, spiders and scrapers with increasing frequency to gather and utilize information gleaned from websites. Bots and scrapers can be divided into four categories, depending on desirability and aggressiveness. Knowing and understanding the different categories and how to mitigate the risks they pose is an important component of a web security strategy. Learn more about how to evaluate which bots to allow access to your company’s website in this summary presentation, and then download the full report at www.stateoftheinternet.com/security-reports
With repeated attacks of multiple TCP flags, Lizard Squad launched several attacks late in 2014 against an Akamai customer. View this presentation for the details of the attacks and their significance, then download the full quarterly security report at www.stateoftheinternet.com/security-reports
http://www.stateoftheinternet.com/security-cybersecurity-network-security.html Offering a concise and easy-to-read summary of the latest security stats, analysis and emerging trends from Q4 2014, this document gives a quick overview of the quarter’s security-related news. Covering valuable data on attack numbers, types and size, as well as source countries, attack vectors and targeted industries, this document also provides insight into some of the emerging trends, risks and challenges facing cyber security.
http://www.akamai.com/stateoftheinternet/ | Shellshock is a critical vulnerability in GNU Bash systems that allows attackers to infiltrate systems and using them to infect others, launch DDoS attacks, share sensitive data, and run programs. Learn how you can protect your computer and your sensitive information from this severe cybersecurity threat in this short slide presentation, then download the full threat advisory at: http://bit.ly/1wEUSkv
Longer attacks and more bandwidth consumption were a leading DDoS trend in Q3 2014. View this short presentation about a major DDoS attack campaign that exemplifies this DDoS trend, and then get all the details from the full Q3 2014 State of the Internet – Security report at http://bit.ly/1t7w6ts
Unmonitored routers, wearables and other Internet-enabled devices give cybercriminals a new means of DDoS attack. Learn how SSDP and UPnP protocols leave these devices open to abuse and find out what you can do to protect your organization. View this short presentation, and then get all the details from the full Q3 2014 State of the Internet – Security report at http://bit.ly/1t7w6ts
http://stateoftheinternet.com/spike | Most botnets target just one kind of system. The Spike DDoS toolkit – the forefront of an Asian crimeware trend – targets not only Linux and Windows system, but takes aim at a new source of bots: Embedded systems. A never-before-seen payload threatens to infect routers, CPE equipment, and even Internet of Things appliances such as smart thermostats and washer/dryers. In this short, 10-slide presentation, learn what you need to know to protect your network: stateoftheinternet.com/spike
http://www.stateoftheinternet.com/ | Attackers have created a new threat to financial data integrity and bank fraud. Bank and financial institution customers whose personal machines have been infected with the Zeus cybercrime malware provide an appealing platform for further exploitation by Yummba webinject tools. Yummba’s robust toolkit allows malicious actors to steal customer data as well as their bank account funds. Learn how you can protect your customers and your business from this high-risk cybersecurity attack toolkit in this summary presentation: http://bit.ly/1GBWuUg
http://www.stateoftheinternet.com/security-cybersecurity-ddos-protection-ddos-mitigation.html | Unprotected Linux machines are vulnerable to a new cybercrime threat. Vulnerable servers can be infected with IptabLes and IptabLex bot malware, allowing malicious actors to remotely control those machines and use them to launch large-scale DDoS attacks. Learn how you can protect your computer and your network from this high-risk cybersecurity attack toolkit in this summary presentation, then download the full threat advisory at http://bit.ly/1Ct9B4b
http://www.stateoftheinternet.com/security-cybersecurity-ddos-protection-ddos-mitigation.html | Record-setting attacks and giant leaps in bandwidth headed the DDoS trends for Q3 2014. View this short presentation, and then get all the details from the full report at http://bit.ly/1533Pvp
http://www.stateoftheinternet.com/security-cybersecurity-ddos-protection-ddos-mitigation.html A high-profile phishing campaign by the Syrian Electronic Army (SEA) illustrates the growing threat posed by phishing attacks. By targeting third-party content providers, SEA vandalized popular media websites. Learn about more about phishing attacks, how to prevent them and how to mitigate them in this short presentation, and then get all the details from the full Q3 2014 State of the Internet – Security report at http://bit.ly/1t7w6ts
http://www.stateoftheinternet.com/resources-web-security-threat-advisories-2014-blackshades-rat.html | The stealthy Blackshades Remote Access Tool makes it all too easy for malicious actors to infect computer with a powerful and multifeatured trojan. Once infected, attackers can monitor audio and video, look through webcams, capture screens, log keystrokes, and a wide variety of other dangerous features. Learn how you can protect your computer and your sensitive information from this severe cybersecurity threat in this short slide presentation.
SSDP DDoS reflection attacks use plug-and-play devices to massively boost the power of a DDoS attack. The latest such attack, discovered in the summer of 2014 harnesses millions of unsecured network devices such as printers, routers, and smart TVs. Read these excerpts for more, then download the full threat advisory atwww.stateoftheinternet.com/ssdp.