
The gaming community is a rising target for credential stuffing attacks
Hackers have targeted the gaming industry by carrying out 12 billion credential stuffing attacks against gaming websites within the 17-month period analyzed in the report …

On the path to Zero Trust security: Time to get started
No need to belabour the point. We all know that trying to defend the network perimeter is a bit futile in today’s mobile and cloud first world. So, the obvious question …

Who are the biggest targets of credential stuffing attacks?
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks, in which malicious actors tap automated …

Fighting credential stuffing attacks is an uphill battle
Hackers directed credential abuse attempts at retail sites more than 10 billion times from May to December last year, making retail the most targeted segment studied, …
Akamai to add CIAM capability to enhance digital trust by acquiring Janrain
Akamai Technologies revealed that the company has entered into an agreement to acquire Janrain. Janrain enables enterprises to enhance digital trust by offloading login and …
Akamai platform enhancements bolster security and agility for digital businesses
Akamai’s platform updates can drive insight, agility, and quality for businesses delivering digital experiences using the Akamai Intelligent Edge Platform to secure and …
Blue Cedar collaborates with OpenSSL, Akamai, NetApp, and VMware to develop FIPS module
Blue Cedar has joined an industry initiative to develop the open-source FIPS 140-2 module for OpenSSL. Blue Cedar will collaborate with Open SSL, Akamai, NetApp, and VMware, …

Security data reveals worldwide malicious login attempts are on the rise
According to the Akamai 2018 State of the Internet / Security Credential Stuffing Attacks report, worldwide malicious login attempts are on the rise. Akamai detected …
YL Ventures expands advisory board with 24 cybersecurity executives
YL Ventures, the Silicon Valley headquartered seed-stage venture capital firm focusing on Israeli cybersecurity innovation, announced a major expansion of its Venture Advisory …

Intensifying DDoS attacks: Choosing your defensive strategy
One of the biggest misconception regarding DDoS attacks is that they are a once-in-a-lifetime event for organizations, says Josh Shaul, VP of Web Security at Akamai. …

Bot-driven credential abuse, DDoS attacks continue to rise
Cybersecurity defenders face increasing threats from organisations in the form of bot-based credential abuse targeting the hospitality industry and advanced DDoS attacks, …

Industry leaders struggle to balance digital innovation and security
Companies are struggling with the tug-of-war between advancing digital innovation and ensuring secure digital experiences that maintain user trust and mitigate risk. As part …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)