Patch Tuesday, October 2024 Edition

Microsoft today released security updates to fix at least 117 security holes in Windows computers and other software, including two vulnerabilities that are already seeing active attacks. Also, Adobe plugged 52 security holes across a range of products, and Apple has addressed a bug in its new macOS 15 “Sequoia” update that broke many cybersecurity tools. Continue reading Patch Tuesday, October 2024 Edition

April’s Patch Tuesday Brings Record Number of Fixes

If only Patch Tuesdays came around infrequently — like total solar eclipse rare — instead of just creeping up on us each month like The Man in the Moon. Although to be fair, it would be tough for Microsoft to eclipse the number of vulnerabilities fixed in this month’s patch batch — a record 147 flaws in Windows and related software. Continue reading April’s Patch Tuesday Brings Record Number of Fixes

Akamai’s new study: Bots, phishing and server attacks making commerce a cybersecurity hotspot

The study shows attackers are using more bots and doing more sophisticated phishing exploits and server attacks, especially targeting retail.
The post Akamai’s new study: Bots, phishing and server attacks making commerce a cybersecurity hotspot a… Continue reading Akamai’s new study: Bots, phishing and server attacks making commerce a cybersecurity hotspot

Credential Stuffing and Account Takeovers — The Business View

Account takeovers (ATOs), in which criminals impersonate legitimate account owners in order to take control of an account, cause tremendous pain for businesses in all industries. This pain may be monetary, such as losses from stolen accounts, but may a… Continue reading Credential Stuffing and Account Takeovers — The Business View

Credential Stuffing and Account Takeovers — The Business View

Account takeovers (ATOs), in which criminals impersonate legitimate account owners in order to take control of an account, cause tremendous pain for businesses in all industries. This pain may be monetary, such as losses from stolen accounts, but may also include a number of related problems, like regulatory and legal issues, lost customers, and the inability to gain new consumers due to a lack of trust. Losses from ATOs and new account fraud are estimated at more than $10 billion annually in the United States alone. Continue reading Credential Stuffing and Account Takeovers — The Business View

Stacking CDNs for Improved Performance and Security

I recently worked with a client whose large e-commerce site was hosted with a popular cloud-based commerce solution. Its business was growing rapidly into new geographic markets, and it was not satisfied with the embedded content delivery network (eCDN) that was bundled with the cloud solution. We demonstrated that stacking CDNs — adding Akamai’s Ion solution on top of the eCDN — could significantly improve performance as well as provide the client with much greater control over its delivery configuration Continue reading Stacking CDNs for Improved Performance and Security

How the Edge Improves Microservices

Microservice architecture has transformed the way we develop and operate our applications. Microservices aren’t a technology or a programming language. Instead, they create a structure for designing and building applications based on the idea that the … Continue reading How the Edge Improves Microservices

How the Edge Improves Microservices

Microservice architecture has transformed the way we develop and operate our applications. Microservices aren’t a technology or a programming language. Instead, they create a structure for designing and building applications based on the idea that the individual functions of a website should operate independently. From this simple concept comes a multitude of benefits including: Continue reading How the Edge Improves Microservices

DHS Among Those Hit in Sophisticated Cyberattack by Foreign Adversaries – Report

The attack was mounted via SolarWinds Orion, in a manual and targeted supply-chain effort. Continue reading DHS Among Those Hit in Sophisticated Cyberattack by Foreign Adversaries – Report