Hero Banner

Akamai Threat Research

Advanced threat intelligence to help manage security risks and protect against cyberattacks

Welcome to a destination where the security community can access, engage with, and learn from Akamai’s threat researchers and the insight that the Akamai Intelligent Edge Platform affords into the evolving threat landscape.

Threat Research

皇冠体育投注 The latest threat advisories, network security white papers, and cloud security news with updates on DDoS attacks, botnets, malware, ransomware, and other cybersecurity vulnerabilities.

Threat Visualizations

皇冠体育投注 Our unprecedented visibility provides insights into DNS and IP traffic that inform threat visualizations to reveal risk factors and attacks blocked, and provide critical security data.

Web Attack Visualization

Daily threat levels by industry and region containing informed Internet security metrics.

Learn More

Global Attacks

The total of all web application attacks observed in the past 24 hours.

Learn More

Enterprise Threat Monitor

皇冠体育投注 Phishing, malware, plus command and control threats blocked visualized in real time.

Learn More

Akamai Threat Research in the News

皇冠体育投注 Top stories in the security industry trade, with insights from our threat intelligence research experts.

Meet Us at the Edge

皇冠体育投注 Get the latest security research firsthand - meet our threat intelligence experts face-to-face at industry events throughout the year.

Security Careers at Akamai Security Careers at Akamai Security Careers at Akamai

Security Careers at Akamai

Passionate about security? Grow with us! Akamai secures and delivers digital experiences for the world’s largest companies. Our intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure.

皇冠体育投注Kick-start a new chapter in your career that will sharpen your skills and spark your imagination.

Security Tools

皇冠体育投注 An array of useful threat research tools from browser debugging to firmware updates.

  • MQTT-PWN A comprehensive solution for IoT broker penetration-testing and security assessment operations. Learn More
  • JSShell An interactive multi-user web JS shell. Learn More
  • Pipiot Double architecture x86/ARM malicious payload construction. Learn More
  • Sonoff-Evil Firmware PoC that demos exploitation by MQTT. Learn More
  • Sonoff-Angel Firmware that hardens usage of dangerous MQTT routines. Learn More

Security Certifications

Robust compliance assessment programs, personal data processing services, and Payment Card Industry Data Security Standard (PCI DSS) certification.