365体育平台Create the world’s best and most secure digital experiences with us.
365体育平台Top brands globally rely on Akamai’s intelligent edge platform so their businesses can be fast, smart, and secure.
365体育平台Stay updated with the latest threat intelligence, real-time data, security reports, and cybersecurity research.
Give our most popular products a try. There’s no commitment.
Fast, Intelligent, and Secure at the Edge
Protect your websites and data centers against even the most sophisticated attacks.
365体育平台Give users instant, reliable, and secure online experiences from any device, anywhere.
365体育平台Delivering the highest quality media at scale—without the costly infrastructure.
Enable new consumer and business services, optimize network traffic, and control costs
In addition to 24/7 product support, we offer a range of technical, strategic, and support services.
365体育平台Automate your workflow with Akamai’s Intelligent Edge Platform.
365体育平台Protect your websites and data centers against even the most sophisticated attacks.
Learn how our customers succeed with Akamai.
Take a look at current global Internet conditions.
365体育平台The State of the Internet series provides expert insights on the cloud security and web performance landscape, based on data gathered from the Akamai Intelligent Edge Platform.
Search our library for helpful resources on topics you care about.
Learn the basics of CDN technology and how it can support your business.
365体育平台Definitions of common cloud technologies and terms.
365体育平台Documentation about Akamai and its products - release notes, quick reference instructions and tutorials.
365体育平台Automate your workflow with Akamai’s intelligent edge platform.
Connect with Akamai's bloggers
365体育平台Connect with Akamai's community
365体育平台Get in touch with our experts 24/7.
Technical Support is an important part of the Akamai experience. Our team provides unrivaled expertise and support to keep your business running smoothly 24/7.
365体育平台Contact the DDoS Attack Hotline for emergency DDoS protection.
Akamai is headquartered in Cambridge, Massachusetts in the United States with operations around the world.
Want to get in touch with us? There are multiple ways to contact an Akamai representative.
Login to Akamai Control Center
Making sense of the new age of information security and web performance.
The State of the Internet series provides expert insights on the cloud security and web performance landscape, based on data gathered from the Akamai Intelligent Edge Platform.
Informed Internet security metrics, including daily threat levels by industry and region.
Access IPv6 adoption rates at the country and network level.
365体育平台Daily updates on IP reputation by location and address.
Emerging trends and market changes related to the security landscape.
New threats appear every day. This report examines them and provides insight into how to protect your company.
365体育平台Why Android mobile browsers are complicated and how they impact user experience.
XMR Cryptomining Targeting x86/i686 Systems
365体育平台We investigate a coin-mining malware that made a jump from ARM-powered IoT devices to Intel systems
Summer Phishing Scams Targeting Vacation Hotspotss
Our Research Team analyzes patterns and trends in a phishing attack campaign targeting vacationers.
Criminals Using Targeted Remote File Inclusion Attacks in Phishing Campaigns
We look at how investigating RFI vulnerability attacks uncovered a campaign to deploy phishing kits.
Adversarial DGA - Is It Out There?
365体育平台We describe three Adversarial DGA attacks that were published recently, and a question whether they are actually used by attackers.
Pykspa v2 DGA Updated to Become Selective
365体育平台Akamai researchers track and analyze recent changes to the Pykspa v2 domain generation algorithm (DGA) and how they have made it more selective.
SIRT Advisory: Silexbot Bricking Systems With Known Default Login Credentials
We look at a new bot using known default credentials for IoT devices to login and kill the system.
Phishing Analytics - Tracking A Campaign
365体育平台We look at analytics and correlate various stats to better understand how phishing campaigns work from within.
CloudTest Vulnerability (CVE-2019-11011)
A new version of CloudTest is available that addresses a critical security vulnerability.
Clever New DDoS Attack Gets a Lot of Bang for a Hacker's Buck
Chad Seaman on the Akamai SIRT team’s WS-Discovery protocol exploitation research and how reflection DDoS attacks are a fact of life in the Internet.
Phishers' Latest Tricks for Reeling in New Victims
365体育平台Steve Ragan and Or Katz share their thoughts on the evolution of phishing techniques and how evasion is at the forefront of phishing kit creators.
8 DDoS Attack Trends To Watch For In 2020
365体育平台Lisa Beegle on the latest DDoS attack trends, including how threat actors are embracing the DDoS for Hire underground market.
Coin-mining Malware Jumps from Arm IoT Gear to Intel Servers
Chad Seaman discusses how DDoS as a Service is alive and well, and continues to be fueled by Akamai SIRT team’s latest discovery.
Fortnite Ransomware Scams Should Force Developers and Gamers to Think About Security
365体育平台Nelson Rodriguez discusses ransomware attacks against Fortnite players and how game publishers and players can help avoid and mitigate cyberattacks.
Turning a Blind Eye to Bots to Protect Ad Revenue? Think Again
Tara Bartley writes about the dilemma that web publishers face when it comes to blocking bot traffic, despite the security risks they may pose.
Threat Advisory: Satori Mirai Variant Alert
365体育平台Read the official threat intelligence brief of the Satori Mirai Variant Alert published by Akamai on December 6, 2017.
Threat Advisory: CLDAP Reflection
365体育平台The Akamai Security Intelligence Response Team (SIRT) recently identified a new Connection-less Lightweight Directory Access Protocol (CLDAP) reflection and amplification method. This advisory analyzes the capabilities of and potential defenses against this new type of reflection attack.
Akamai Security Intelligence & Threat Research Blog
365体育平台Read the latest insights and commentary on relevant topics from Akamai's experts in security intelligence and threat research.
Web Attack Visualization
365体育平台View threat levels by industry and region, countries launching the web attacks, and the most common Internet attack methods.
Real-Time Web Monitor
View global regions targeted by the greatest web attack traffic, cities with the slowest web connections, and geographic areas with the most web traffic.
Network Performance Comparison
Optimize in real time to improve performance and reliability.
Real-Time Content Delivery
365体育平台Get real-time visibility into web traffic and attacks.
Global Client Reputation Visualization
Updated daily, the IP reputation map shows the location of each IP address listed in Akamai's Kona Client Reputation dataset. The visualization displays the networks hosting these IP addresses.
IPv6 Adoption Visualization
Review IPv6 adoption trends at a country or network level.