www.akamai.com Open in urlscan Pro
2a02:26f0:ef:2a0::b63  Public Scan

Submitted URL: http://blogs.akamai.com/
Effective URL: https://www.akamai.com/blog
Submission: On July 22 via api from SG — Scanned from DE

Form analysis 2 forms found in the DOM

<form role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="downshift-0-label">
  <div class="sui-search-box">
    <div class="sui-search-box__wrapper"><input aria-autocomplete="list" aria-labelledby="downshift-0-label" autocomplete="off" id="downshift-0-input" placeholder="Search Akamai.com..." class="sui-search-box__text-input "
        aria-label="Search Akamai.com..." value=""><label></label></div>
  </div>
</form>

<form role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="downshift-1-label">
  <div class="sui-search-box">
    <div class="sui-search-box__wrapper"><input aria-autocomplete="list" aria-labelledby="downshift-1-label" autocomplete="off" id="downshift-1-input" placeholder="Search" class="sui-search-box__text-input " aria-label="Search"
        value=""><label></label></div>
  </div>
</form>

Text Content

Twitter LinkedIn Email

Close

Skip to main content
+49-8994006308
+49-8994006308
en
 * English
 * Deutsch
 * Español
 * Français
 * Italiano
 * Português
 * 中文
 * 日本語
 * 한국어


Login
Try Akamai
Under Attack?
Products & Solutions
 * Security
 * App and API Security
 * Remote Work Security
 * Account Takeover Protection
 * DDoS Protection

 * Content Delivery (CDN)
 * App and API Performance
 * Media Delivery

 * Edge Compute
 * Serverless Computing
 * Edge Applications
 * Cloud Optimization
 * Cloud Computing - Linode

 * Solutions by Industry
 * Ecommerce
 * Financial Services
 * Network Operator
 * Public Sector
 * Media

 * All Products

 * Global Services


 * 

Back
Why Akamai
 * Our Platform
 * About Us

Back
Resources
 * Resource Library
 * Videos
 * Customer Stories
 * Ebooks
 * Product Briefs
 * Reference Architectures
 * Webinars
 * White Papers

 * Connect
 * Blog
 * Events

 * Learn
 * Learning Hub
 * Developer Hub
 * Internet Visualizations
 * State of the Internet
 * Our Thinking
 * What Is a CDN?
 * What Is a DDoS Attack?
 * What Is Zero Trust Security?
 * What Is Edge Computing?

Back
Contact Us
 * Contact Sales
 * Customer Support
 * Get in Touch
 * Akamai Partners

Back

Back
+49-8994006308
en
 * English
 * Deutsch
 * Español
 * Français
 * Italiano
 * Português
 * 中文
 * 日本語
 * 한국어

Login



BLOG

RSS
Security

TCP MIDDLEBOX REFLECTION: COMING TO A DDOS NEAR YOU

Over the past week, Akamai Security Researchers have detected and analyzed a
series of TCP reflection attacks, peaking at 11 Gbps at 1.5 Mpps, that were
leveled...

by Security Intelligence Response Team
Filter by
Latest
Category
CloudCultureDevelopersEdgeNewsPerformanceSecurityTrends
Products
Adaptive Media DeliveryAdaptive Media PlayerAkamai MFAAPI AccelerationAPI
GatewayAPI Prioritization CloudletApp and API ProtectorApplication Load Balancer
CloudletAudience Segmentation CloudletBot ManagerCloud
WrapperCloudletsCloudTestDataStreamDedicated DeliveryDirect ConnectDNS
InfrastructureDownload DeliveryDynamic Site DeliveryEdge DNSEdge Redirector
CloudletEdgeKVEdgeWorkersEnterprise Application AccessForward Rewrite
CloudletGlobal Traffic ManagementIdentity CloudImage and Video ManagerInput
Validation CloudletIonIoT Edge ConnectIP Application AcceleratorKona Site
DefenderManaged Security ServicesMedia AnalyticsMedia Services
LivemPulseNetStoragePage Integrity ManagerPhased Release CloudletProlexicRequest
Control CloudletSecure Internet AccessSecure Internet AccessSecure Internet
Access ISPsSecure Internet Access MNOsSecurity and Personalization
ServicesSegmentationSession AcceleratorSite ShieldVaccine EdgeVisitor
Prioritization CloudletWeb Application Protector
Author
Aaron AholaAdam KaronAdhyayan PanwarAkamaiAkamai InfoSecAkamai Security
ResearchAkamai SIRT AlertsAkamai Threat Research TeamAkshay RanganathAleksandra
Blaszczyk Alex BalfordAlex Balford and Erik Nygren Alex CaroAmanda GoeddeAmirah
Zahidah binti OnnAmiram CohenAmit MohantyAmit SerperAmol MathurAndres
GonzalezAndrew HeifetzAparna Rayasam, SVP & GM Application Security,
AkamaiApplication Security Threat Research TeamAri WeilAriel ZeitlinArjun
RampalAsaf NadlerAssaf VilmovskiAssaf Vilmovsky and Maxim ZavodchikAssaf
Vilmovsky, Abdeslam Bella and Maxim ZavodchikAvishag DanielyBarry GreeneBen
BarneaBen Barnea and Ophir HarpazBeth FaviniBill BangsBoaz GelbordBonnie
HowdenBrian ApleyBridget MeuseBridget Meuse & Connor DarioBridget Meuse, Tony
LauroBruce Van NiceCaitlin BrightmanChad SeamanCharles ChoeCharlie GeroChinedu
EgonuChris NicholsonChristine RossChuck FreedmanCJ ArnesenCory SakakeenyCourtney
HaddenCraig SparlingDan PetrilloDaniel AbelesDaniel GoldbergDaniel Goldberg and
Ofri ZivDaniel Goldberg and Ravit GreitserDaniel Goldberg, Ofri Ziv and Mor
MatalonDanny SternDave BurtonDave KleinDean HouariDomitian Tamas-SeliceanDr.
Robert Blumofe and Ariel ZeitlinDr. Robert Blumofe and Lauren Van WazerEran
GalEric ProeglerErik NygrenEvyatar SaiasFadi SabaGal BitenskyGal MeiriGerhard
GieseGreg BurnsGregory GriffithsGuardicore Labs TeamGuest BloggerHarish
MenonHema PatelHen TzabanHideki ItoHisashi YamaguchiHitoshi KanekoHitoshi
KanekoIan MunfordIga KoprowskaIgor LivshitzIna ChristovaJames CaseyJames
KretchmarJavier GarzaJeffrey CostaJessica Capuano MoraJessie ParkJim BlackJim
GilbertJJ Lehmann Jo Gumbs and Yancy Carrasco Johnny YeoJon AlexanderJonathan
Morgan Jonathan RespetoJonathan SingerJonathan ZarkowerJordan GarzonJosh
JohnsonJulie CareyJulie KleinKaan OnarliogluKara DiGiacomoKathryn KunKeith
TomlinsonKenda CarlsonKhalil SmithKim Salem-JacksonKit KnoxKristin
Nelson-PatelKunjal BotadraKurian ThomasLarry CashdollarLelah ManzLiad Mordekoviz
and Ophir HarpazLily NguyenLior LahavLior NeudorferLorenz JakoberLorenz
JakoberMagda BukalaMagdalena FrankiewiczMani SundaramMarco RaffaelliMario
KorfMark PorterMartin McKeayMayuko Kiguchi Megan FreshleyMichael ArcherMichael
HansenMicheal McColloughMick HigginsMike BishopMike ElissenMike KaneMike
MatteraMike SalvatoreMisha YaverbaumMolly Elise Young, Nicole Wheaton, Trish
Zagarella, Danielle ReeseMor MatalonNatalie BillinghamNathalie FaintNeha
JainNicole FitzpatrickNoam FreedmanNoy AizenbergOctavio HernandezOfri ZivOla
SergatchovOphir HarpazOphir Harpaz and Daniel GoldbergOphir Harpaz and Stiv
KupchikOphir Harpaz, Peleg HadarOr KatzOri David, Ophir Harpaz, Eliad Kimhy,
Liron SchiffOri KanferPatrick SullivanPavel DespotPeter ChavePJ JosephPrasad
MandavaRalph Aantjes Ravit GreitserRenny Shen Rich SalzRichard MeeusRick
McConnellRita Aspen Robert BlumofeRoman LvovskyRon ShahnovskyRyan BarnettSam
PrestonSamuel ErbSandeep SinghSanjay SadaranganiSecurity Intelligence Response
TeamShane Keats Shantanu KedarSharon BesserShiran GuezSid PhadkarSimon
HearneStephen LudinStephen StiererSteve RaganSteven GamatanStiv KupchikSusan
McReynoldsSushma Shashidhara Sven DummerTeresa ShirkovaThe Infection Monkey
teamThong Hsin ShengTiffany HoganTom EmmonsTom LeightonTomer ShlomoTrevor
BlackfordTricia HowardVaruna GPVinay KanitkarVitor NakanoWill LawWill
SmitheeYael DaihesZiv Eli

LATEST BLOG POSTS

Security

PCI DSS V4.0: MEETING EMERGING NEEDS FOR SCRIPT MONITORING AND MANAGEMENT

PCI DSS v4.0 makes Akamai Page Integrity Manager essential for any customer that
processes or transmits cardholder data.

by Christine Ross
Security

GAME ON! ROOTER ACHIEVES MASSIVE ESPORTS GROWTH

Learn how Rooter, India’s leading esports platform, achieved massive esports
growth, delivering a gripping experience to players and fans alike.

by Jonathan Singer
News

CYBERSECURITY IS A TEAM SPORT: 3 TAKEAWAYS FROM ISRAEL’S CYBER WEEK

The future of cybersecurity relies on successful international partnerships and
collaboration to ultimately thwart cybercriminals and cyberattacks.

by Julie Klein
Security

THE KIT THAT WANTS IT ALL: SCAM MIMICS PAYPAL’S KNOWN SECURITY MEASURES

Identity theft affects millions of people every year. See this piece on a scam
purporting to be PayPal in an effort to gain total identity theft.

by Akamai Security Research
Developers

MEET TEDD SMITH: SOLUTIONS ENGINEER AT AKAMAI

Meet Tedd Smith, solutions engineer at Akamai. He discusses today’s
media-streaming landscape and how he crafts solutions for higher-quality user
experiences.

by Chuck Freedman
Security

RANSOMWARE ATTACK ON AIRLINE INDUSTRY: TURNING POINT FOR INDIA AND OTHERS

Cybercriminals are attacking organizations in the APAC region with ransomware.
Learn how to implement security strategies to mitigate and recover from attacks.

by Dean Houari
News

BLOOMFIELD ROBOTICS WINS FUNDING TO FEED PEOPLE ON EARTH AND IN SPACE

Akamai awarded Bloomfield Robotics $1M in cloud, compute, and security products
to grow their AI business and help feed the world.

by Peter Chave
Security

AKAMAI’S OBSERVATIONS OF CONFLUENCE ZERO DAY (CVE-2022-26134)

The Atlassian Confluence vulnerability is here to stay. See Akamai's research
into the stats two weeks after the advisory was released.

by Akamai Security Research
Developers

WHAT’S NEW FOR DEVELOPERS: JUNE 2022

Read about our recent Terraform updates and managed database services, our
latest Meet the Developer articles, and stream videos on edge computing.

by Jessica Capuano Mora
Security

BOTS ARE SCALPING ISRAELI GOVERNMENT SERVICES

Bots can be used for good, but can also be nefarious. In this post, see Akamai's
research on the Israeli Gamken bot copycat.

by Akamai Security Research
Security

THE RELENTLESS EVOLUTION OF DDOS ATTACKS

Explore how DDoS attacks are practically unrecognizable from those of the past
few years thanks to constant innovation in the threat landscape

by Craig Sparling
Edge

WHAT'S THE VALUE OF A KEY-VALUE STORE?

Learn about the benefits and drawbacks of a key-value store: a data structure
designed for storing and returning values associated with keys as unique
identifie...

by Jeffrey Costa
Load more
Twitter Facebook YouTube LinkedIn


SOLUTIONS

 * Security
 * Content Delivery (CDN)
 * Edge Compute


COMPANY

 * History
 * Facts and Figures
 * Leadership
 * Board of Directors
 * Investor Relations
 * Environmental, Social, and Governance
 * Ethics
 * Locations


NEWSROOM

 * Press Releases
 * In the News
 * Awards
 * Media Resources


CAREERS

 * Working at Akamai
 * Students and Recent Grads
 * Workplace Diversity
 * Search Jobs
 * Careers Blog


COMPLIANCE

 * Legal
 * Privacy Trust Center
 * Cookie Settings

--------------------------------------------------------------------------------

©2022 Akamai Technologies

 * en
    * English
    * Deutsch
    * Español
    * Français
    * Italiano
    * Português
    * 中文
    * 日本語
    * 한국어

 * EMEA Legal Notices
 * Service Status

Searching for "". Showing 1 to 20 results out of 1516.


YOUR COOKIE CHOICES FOR THIS WEBSITE

We use cookies to ensure the fast reliable and secure operation of this website,
to improve your website experience, to enable certain social media interactions
and to manage your cookie choices. Some cookies process personal data. By
agreeing to the placement storing of the cookies you also accept agree to the
related personal data processing activities, where applicable. Click “Manage
Preferences” to make individual choices and get details on the cookies in use
and the processing activities in the Cookie Details section, click “Accept
Cookies” to agree to the storing of all cookies except for strictly necessary
cookies and the data processing activities or click “Reject Cookies” to reject
all cookies except for strictly necessary cookies. You can withdraw your consent
at any time by clicking on the Cookie Icon that appears at the lower left corner
when scrolling the website. For additional information relating to your privacy
take a look at our Privacy Statement.Privacy Statement

Reject Cookies
Accept CookiesManage Preferences