www.akamai.com
Open in
urlscan Pro
2a02:26f0:ef:2a0::b63
Public Scan
Submitted URL: http://blogs.akamai.com/
Effective URL: https://www.akamai.com/blog
Submission: On July 22 via api from SG — Scanned from DE
Effective URL: https://www.akamai.com/blog
Submission: On July 22 via api from SG — Scanned from DE
Form analysis
2 forms found in the DOM<form role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="downshift-0-label">
<div class="sui-search-box">
<div class="sui-search-box__wrapper"><input aria-autocomplete="list" aria-labelledby="downshift-0-label" autocomplete="off" id="downshift-0-input" placeholder="Search Akamai.com..." class="sui-search-box__text-input "
aria-label="Search Akamai.com..." value=""><label></label></div>
</div>
</form>
<form role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="downshift-1-label">
<div class="sui-search-box">
<div class="sui-search-box__wrapper"><input aria-autocomplete="list" aria-labelledby="downshift-1-label" autocomplete="off" id="downshift-1-input" placeholder="Search" class="sui-search-box__text-input " aria-label="Search"
value=""><label></label></div>
</div>
</form>
Text Content
Twitter LinkedIn Email Close Skip to main content +49-8994006308 +49-8994006308 en * English * Deutsch * Español * Français * Italiano * Português * 中文 * 日本語 * 한국어 Login Try Akamai Under Attack? Products & Solutions * Security * App and API Security * Remote Work Security * Account Takeover Protection * DDoS Protection * Content Delivery (CDN) * App and API Performance * Media Delivery * Edge Compute * Serverless Computing * Edge Applications * Cloud Optimization * Cloud Computing - Linode * Solutions by Industry * Ecommerce * Financial Services * Network Operator * Public Sector * Media * All Products * Global Services * Back Why Akamai * Our Platform * About Us Back Resources * Resource Library * Videos * Customer Stories * Ebooks * Product Briefs * Reference Architectures * Webinars * White Papers * Connect * Blog * Events * Learn * Learning Hub * Developer Hub * Internet Visualizations * State of the Internet * Our Thinking * What Is a CDN? * What Is a DDoS Attack? * What Is Zero Trust Security? * What Is Edge Computing? Back Contact Us * Contact Sales * Customer Support * Get in Touch * Akamai Partners Back Back +49-8994006308 en * English * Deutsch * Español * Français * Italiano * Português * 中文 * 日本語 * 한국어 Login BLOG RSS Security TCP MIDDLEBOX REFLECTION: COMING TO A DDOS NEAR YOU Over the past week, Akamai Security Researchers have detected and analyzed a series of TCP reflection attacks, peaking at 11 Gbps at 1.5 Mpps, that were leveled... by Security Intelligence Response Team Filter by Latest Category CloudCultureDevelopersEdgeNewsPerformanceSecurityTrends Products Adaptive Media DeliveryAdaptive Media PlayerAkamai MFAAPI AccelerationAPI GatewayAPI Prioritization CloudletApp and API ProtectorApplication Load Balancer CloudletAudience Segmentation CloudletBot ManagerCloud WrapperCloudletsCloudTestDataStreamDedicated DeliveryDirect ConnectDNS InfrastructureDownload DeliveryDynamic Site DeliveryEdge DNSEdge Redirector CloudletEdgeKVEdgeWorkersEnterprise Application AccessForward Rewrite CloudletGlobal Traffic ManagementIdentity CloudImage and Video ManagerInput Validation CloudletIonIoT Edge ConnectIP Application AcceleratorKona Site DefenderManaged Security ServicesMedia AnalyticsMedia Services LivemPulseNetStoragePage Integrity ManagerPhased Release CloudletProlexicRequest Control CloudletSecure Internet AccessSecure Internet AccessSecure Internet Access ISPsSecure Internet Access MNOsSecurity and Personalization ServicesSegmentationSession AcceleratorSite ShieldVaccine EdgeVisitor Prioritization CloudletWeb Application Protector Author Aaron AholaAdam KaronAdhyayan PanwarAkamaiAkamai InfoSecAkamai Security ResearchAkamai SIRT AlertsAkamai Threat Research TeamAkshay RanganathAleksandra Blaszczyk Alex BalfordAlex Balford and Erik Nygren Alex CaroAmanda GoeddeAmirah Zahidah binti OnnAmiram CohenAmit MohantyAmit SerperAmol MathurAndres GonzalezAndrew HeifetzAparna Rayasam, SVP & GM Application Security, AkamaiApplication Security Threat Research TeamAri WeilAriel ZeitlinArjun RampalAsaf NadlerAssaf VilmovskiAssaf Vilmovsky and Maxim ZavodchikAssaf Vilmovsky, Abdeslam Bella and Maxim ZavodchikAvishag DanielyBarry GreeneBen BarneaBen Barnea and Ophir HarpazBeth FaviniBill BangsBoaz GelbordBonnie HowdenBrian ApleyBridget MeuseBridget Meuse & Connor DarioBridget Meuse, Tony LauroBruce Van NiceCaitlin BrightmanChad SeamanCharles ChoeCharlie GeroChinedu EgonuChris NicholsonChristine RossChuck FreedmanCJ ArnesenCory SakakeenyCourtney HaddenCraig SparlingDan PetrilloDaniel AbelesDaniel GoldbergDaniel Goldberg and Ofri ZivDaniel Goldberg and Ravit GreitserDaniel Goldberg, Ofri Ziv and Mor MatalonDanny SternDave BurtonDave KleinDean HouariDomitian Tamas-SeliceanDr. Robert Blumofe and Ariel ZeitlinDr. Robert Blumofe and Lauren Van WazerEran GalEric ProeglerErik NygrenEvyatar SaiasFadi SabaGal BitenskyGal MeiriGerhard GieseGreg BurnsGregory GriffithsGuardicore Labs TeamGuest BloggerHarish MenonHema PatelHen TzabanHideki ItoHisashi YamaguchiHitoshi KanekoHitoshi KanekoIan MunfordIga KoprowskaIgor LivshitzIna ChristovaJames CaseyJames KretchmarJavier GarzaJeffrey CostaJessica Capuano MoraJessie ParkJim BlackJim GilbertJJ Lehmann Jo Gumbs and Yancy Carrasco Johnny YeoJon AlexanderJonathan Morgan Jonathan RespetoJonathan SingerJonathan ZarkowerJordan GarzonJosh JohnsonJulie CareyJulie KleinKaan OnarliogluKara DiGiacomoKathryn KunKeith TomlinsonKenda CarlsonKhalil SmithKim Salem-JacksonKit KnoxKristin Nelson-PatelKunjal BotadraKurian ThomasLarry CashdollarLelah ManzLiad Mordekoviz and Ophir HarpazLily NguyenLior LahavLior NeudorferLorenz JakoberLorenz JakoberMagda BukalaMagdalena FrankiewiczMani SundaramMarco RaffaelliMario KorfMark PorterMartin McKeayMayuko Kiguchi Megan FreshleyMichael ArcherMichael HansenMicheal McColloughMick HigginsMike BishopMike ElissenMike KaneMike MatteraMike SalvatoreMisha YaverbaumMolly Elise Young, Nicole Wheaton, Trish Zagarella, Danielle ReeseMor MatalonNatalie BillinghamNathalie FaintNeha JainNicole FitzpatrickNoam FreedmanNoy AizenbergOctavio HernandezOfri ZivOla SergatchovOphir HarpazOphir Harpaz and Daniel GoldbergOphir Harpaz and Stiv KupchikOphir Harpaz, Peleg HadarOr KatzOri David, Ophir Harpaz, Eliad Kimhy, Liron SchiffOri KanferPatrick SullivanPavel DespotPeter ChavePJ JosephPrasad MandavaRalph Aantjes Ravit GreitserRenny Shen Rich SalzRichard MeeusRick McConnellRita Aspen Robert BlumofeRoman LvovskyRon ShahnovskyRyan BarnettSam PrestonSamuel ErbSandeep SinghSanjay SadaranganiSecurity Intelligence Response TeamShane Keats Shantanu KedarSharon BesserShiran GuezSid PhadkarSimon HearneStephen LudinStephen StiererSteve RaganSteven GamatanStiv KupchikSusan McReynoldsSushma Shashidhara Sven DummerTeresa ShirkovaThe Infection Monkey teamThong Hsin ShengTiffany HoganTom EmmonsTom LeightonTomer ShlomoTrevor BlackfordTricia HowardVaruna GPVinay KanitkarVitor NakanoWill LawWill SmitheeYael DaihesZiv Eli LATEST BLOG POSTS Security PCI DSS V4.0: MEETING EMERGING NEEDS FOR SCRIPT MONITORING AND MANAGEMENT PCI DSS v4.0 makes Akamai Page Integrity Manager essential for any customer that processes or transmits cardholder data. by Christine Ross Security GAME ON! ROOTER ACHIEVES MASSIVE ESPORTS GROWTH Learn how Rooter, India’s leading esports platform, achieved massive esports growth, delivering a gripping experience to players and fans alike. by Jonathan Singer News CYBERSECURITY IS A TEAM SPORT: 3 TAKEAWAYS FROM ISRAEL’S CYBER WEEK The future of cybersecurity relies on successful international partnerships and collaboration to ultimately thwart cybercriminals and cyberattacks. by Julie Klein Security THE KIT THAT WANTS IT ALL: SCAM MIMICS PAYPAL’S KNOWN SECURITY MEASURES Identity theft affects millions of people every year. See this piece on a scam purporting to be PayPal in an effort to gain total identity theft. by Akamai Security Research Developers MEET TEDD SMITH: SOLUTIONS ENGINEER AT AKAMAI Meet Tedd Smith, solutions engineer at Akamai. He discusses today’s media-streaming landscape and how he crafts solutions for higher-quality user experiences. by Chuck Freedman Security RANSOMWARE ATTACK ON AIRLINE INDUSTRY: TURNING POINT FOR INDIA AND OTHERS Cybercriminals are attacking organizations in the APAC region with ransomware. Learn how to implement security strategies to mitigate and recover from attacks. by Dean Houari News BLOOMFIELD ROBOTICS WINS FUNDING TO FEED PEOPLE ON EARTH AND IN SPACE Akamai awarded Bloomfield Robotics $1M in cloud, compute, and security products to grow their AI business and help feed the world. by Peter Chave Security AKAMAI’S OBSERVATIONS OF CONFLUENCE ZERO DAY (CVE-2022-26134) The Atlassian Confluence vulnerability is here to stay. See Akamai's research into the stats two weeks after the advisory was released. by Akamai Security Research Developers WHAT’S NEW FOR DEVELOPERS: JUNE 2022 Read about our recent Terraform updates and managed database services, our latest Meet the Developer articles, and stream videos on edge computing. by Jessica Capuano Mora Security BOTS ARE SCALPING ISRAELI GOVERNMENT SERVICES Bots can be used for good, but can also be nefarious. In this post, see Akamai's research on the Israeli Gamken bot copycat. by Akamai Security Research Security THE RELENTLESS EVOLUTION OF DDOS ATTACKS Explore how DDoS attacks are practically unrecognizable from those of the past few years thanks to constant innovation in the threat landscape by Craig Sparling Edge WHAT'S THE VALUE OF A KEY-VALUE STORE? Learn about the benefits and drawbacks of a key-value store: a data structure designed for storing and returning values associated with keys as unique identifie... by Jeffrey Costa Load more Twitter Facebook YouTube LinkedIn SOLUTIONS * Security * Content Delivery (CDN) * Edge Compute COMPANY * History * Facts and Figures * Leadership * Board of Directors * Investor Relations * Environmental, Social, and Governance * Ethics * Locations NEWSROOM * Press Releases * In the News * Awards * Media Resources CAREERS * Working at Akamai * Students and Recent Grads * Workplace Diversity * Search Jobs * Careers Blog COMPLIANCE * Legal * Privacy Trust Center * Cookie Settings -------------------------------------------------------------------------------- ©2022 Akamai Technologies * en * English * Deutsch * Español * Français * Italiano * Português * 中文 * 日本語 * 한국어 * EMEA Legal Notices * Service Status Searching for "". Showing 1 to 20 results out of 1516. YOUR COOKIE CHOICES FOR THIS WEBSITE We use cookies to ensure the fast reliable and secure operation of this website, to improve your website experience, to enable certain social media interactions and to manage your cookie choices. Some cookies process personal data. By agreeing to the placement storing of the cookies you also accept agree to the related personal data processing activities, where applicable. Click “Manage Preferences” to make individual choices and get details on the cookies in use and the processing activities in the Cookie Details section, click “Accept Cookies” to agree to the storing of all cookies except for strictly necessary cookies and the data processing activities or click “Reject Cookies” to reject all cookies except for strictly necessary cookies. You can withdraw your consent at any time by clicking on the Cookie Icon that appears at the lower left corner when scrolling the website. For additional information relating to your privacy take a look at our Privacy Statement.Privacy Statement Reject Cookies Accept CookiesManage Preferences