Advanced threat intelligence to help manage security risks and protect against cyberattacks
Welcome to a destination where the security community can access, engage with, and learn from Akamai’s threat researchers and the insight that the Akamai Intelligent Edge Platform affords into the evolving threat landscape.
In addition to driving industry-leading security intelligence, Akamai threat researchers regularly publish in academic journals and present at conferences and industry association events, sharing mitigation strategies and data focused on the constantly evolving security landscape.
People Management with Kathryn Kun: A Discussion
Kathryn Kun, the XO of the Office of the CSO, joins Martin and Steve for a discussion about people management, and the challenges associated.
Three Editors Walk Into a Podcast: A Discussion
Steve, Martin, and Amanda talk about what it’s like to edit a report the size of the SOTI.
Detecting Mylobot, unseen DGA based malware, using Deep Learning
We look at an unfamiliar botnet generating more DNS traffic than all of the other botnets currently tracked on Akamai’s platform.
Featured Security Report
State of the Internet / Security: 2021 - Phishing for Finance
It was another record-breaking year for cyberattacks against the financial industry. Credential stuffing attacks were up 45%, while SQL Injection and Local File Inclusion were the most common web attacks. Along with an overall increase in incidents, 2020 saw new daily peaks, with attacks reaching 63 million attacks in one day in November. And we witnessed the rise of phishing kits, which introduced a whole new approach for hackers to take. In our latest report, we team up with WMC Global to bring you a complete, in-depth look at the current state of cyberthreats against FinServ businesses.
Tom Emmons is a Principal Product Architect and data enthusiast who leads a team focused on machine learning, automation, and intelligence. His areas of security expertise are in DDoS and Application Security, with specific interest in Business Intelligence. Tom is in his element tracking attack campaigns, investigating global trends and automating response to the evolving threat landscape.
Our unprecedented visibility provides insights into DNS and IP traffic that inform threat visualizations to reveal risk factors and attacks blocked, and provide critical security data.
Web Attack Visualization
Daily threat levels by industry and region containing informed Internet security metrics.
The total of all web application attacks observed in the past 24 hours.
Enterprise Threat Monitor
Phishing, malware, plus command and control threats blocked visualized in real time.