Akamai Announces Content Protector to Stop Scraping Attacks

PRESS RELEASE. CAMBRIDGE, Mass., Feb. 6, 2024 /PRNewswire/ - Akamai Technologies, Inc., the cloud company that powers and protects life online, today announced the availability of Content Protector, a product that stops scraping attacks without blocking the good traffic that companies need to enhance their business.
Scraper bots are a critical and often productive part of the commerce ecosystem.
These bots search for new content, highlight products in comparison sites, and gather updated product information to share with customers.
Scrapers also get used for harmful purposes such as competitive undercutting, surveillance before inventory hoarding attacks, and counterfeiting goods and websites.
Scrapers also ping sites 24/7 unless stopped - so they can degrade site performance, which in turn frustrates consumers and causes them to abandon their visits.
Scrapers have become much more evasive and sophisticated over the past few years.
Akamai Content Protector helps detect and mitigate evasive scrapers that steal content for malicious purposes.
It enables improved site performance, an enhanced user experience and protection of intellectual property while facilitating significantly better detections and fewer false negatives without increasing the rate of false positives.
The product is designed for companies that need to protect their reputation and revenue potential.
Protocol-level assessment: Protocol fingerprinting checks how visitors connect to your site to ensure they're legitimate.
It evaluates how the client establishes the connection with the server at the different layers of the Open Systems Interconnection model - verifying that the parameters negotiated align with the one expected from the most common web browsers and mobile applications.
Application-level assessment: Evaluates if the client can run some business logic written in JavaScript.
When the client runs JavaScript, it collects the device and browser characteristics and user preferences.
These various data points are compared and cross-checked against the protocol-level data to verify consistency.
User interaction: Analyzes user interactions to distinguish between human and bot traffic.
It assesses how users interact with devices such as touch screens, keyboards, and mouse, identifying bots through their lack of interaction or abnormal usage patterns.
User behavior: Monitors visitor behavior on your website to identify unusual patterns indicative of bots.
Risk classification: Provides a deterministic and actionable low-, medium-, or high-risk classification of the traffic, based on the anomalies found during the evaluation.
Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences - helping billions of people live, work, and play every day.
Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away.


This Cyber News was published on www.darkreading.com. Publication date: Tue, 06 Feb 2024 22:50:28 +0000


Cyber News related to Akamai Announces Content Protector to Stop Scraping Attacks

Is Web Scraping Illegal? - Legal actions against web scraping are slow and vary by country, leaving organizations to fend for themselves. Web scraping is a technique to swiftly pull large amounts of data from websites using automated software. Web scraping differs from screen ...
1 year ago Imperva.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Akamai Announces Content Protector to Stop Scraping Attacks - PRESS RELEASE. CAMBRIDGE, Mass., Feb. 6, 2024 /PRNewswire/ - Akamai Technologies, Inc., the cloud company that powers and protects life online, today announced the availability of Content Protector, a product that stops scraping attacks without ...
10 months ago Darkreading.com
Akamai discloses zero-click exploit for Microsoft Outlook - While examining a previous bypass mitigation, Akamai Technologies discovered two new Windows vulnerabilities that could allow an attacker to create a zero-click exploit against Microsoft Outlook clients. In a two-part report published Monday, Akamai ...
1 year ago Techtarget.com
Microsoft Outlook Zero-Click Security Flaws Triggered by Sound File - Researchers this week disclosed details on two security vulnerabilities in Microsoft Outlook that, when chained together, give attackers a way to execute arbitrary code on affected systems without any user interaction. Unusually, both of them can be ...
1 year ago Darkreading.com
Attacks abuse Microsoft DHCP to spoof DNS records The Register - A series of attacks against Microsoft Active Directory domains could allow miscreants to spoof DNS records, compromise Active Directory and steal all the secrets it stores, according to Akamai security researchers. We're told the attacks - which are ...
1 year ago Go.theregister.com
Web scraping is not just a security or fraud problem - Bots compose 42% of overall web traffic, and 65% of these bots are malicious, according to Akamai. Negative effects of scraper bots on business operations. Web scraping is not just a fraud or security problem, it is also a business problem. Scraper ...
5 months ago Helpnetsecurity.com
Unix Printing Vulnerabilities Enable Easy DDoS Attacks - "For each packet sent, the vulnerable CUPS server will generate a larger and partially attacker-controlled IPP/HTTP request directed at the specified target." Akamai found that all it takes for someone to launch an attack is to send a ...
2 months ago Darkreading.com
No Robots(.txt): How to Ask ChatGPT and Google Bard to Not Use Your Website for Training - Both OpenAI and Google have released guidance for website owners who do not want the two companies using the content of their sites to train the company's large language models. We've long been supporters of the right to scrape websites-the process ...
1 year ago Eff.org
Experts warn of DDoS attacks using linux printing vulnerability - Benjamin Harris, CEO of cybersecurity firm watchTowr, said CUPS itself is the software that handles printing on a Linux machine, and thus, by virtue of Linux not being a 'desktop' operating system in many environments in the same way that ...
2 months ago Therecord.media
New botnet malware exploits two zero-days to infect NVRs and routers - A new Mirai-based malware botnet named 'InfectedSlurs' has been exploiting two zero-day remote code execution vulnerabilities to infect routers and video recorder devices. The malware hijacks the devices to make them part of its DDoS swarm, ...
1 year ago Bleepingcomputer.com
Navigating the New Frontier of AI-Driven Cybersecurity Threats - A few weeks ago, Best Buy revealed its plans to deploy generative AI to transform its customer service function. Best Buy's initiative is a harbinger of generative AI deployment in enterprise settings, aiming to increase productivity and improve ...
7 months ago Securityboulevard.com
Outlook Plays Attacker Tunes: Vulnerability Chain Leading to Zero-Click RCE - Security researchers at Akamai are sharing details on multiple bypasses for patches Microsoft released for an Outlook zero-click remote code execution vulnerability earlier this year. The original issue, tracked as CVE-2023-23397, was patched by ...
1 year ago Securityweek.com
Recently patched CUPS flaw can be used to amplify DDoS attacks - As Akamai security researchers found, a CVE-2024-47176 security flaw in the cups-browsed daemon that can be chained with three other bugs to gain remote code execution on Unix-like systems via a single UDP packet can also be leveraged to ...
2 months ago Bleepingcomputer.com
What You Need to Know, What You Need to Do - The war in Ukraine is heating up again in recent days with multiple missile and drone strikes. The action comes on the heels of Western allies' promises of tank assistance to help push back Russian forces. The battle against cybercriminals is hitting ...
1 year ago Akamai.com
Researchers Uncovered an Active Directory DNS spoofing exploit - In the intricate web of our interconnected world, the Domain Name System stands as a linchpin, directing users to their online destinations. Even this vital system is not impervious to the dark art of malicious manipulation. In a recent revelation by ...
1 year ago Gbhackers.com
Web Shells Gain Sophistication for Stealth, Persistence - Web shells, a common type of post-exploitation tool that provides easy-to-use interface through which to issue commands to a compromised server, have become increasingly popular as attackers become more cloud-aware, experts say. A Web shell known as ...
1 year ago Darkreading.com
'Yet another Mirai-based botnet' is spreading an illicit cryptominer - A well-designed operation is using a version of the infamous Mirai malware to secretly distribute cryptocurrency mining software, researchers said Wednesday. Calling it NoaBot, researchers at Akamai said the campaign has been active for about a year, ...
11 months ago Therecord.media
CVE-2018-12886 - stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack ...
4 years ago
CVE-2023-4039 - ...
6 months ago
Silverfort Announces New Integration with Microsoft Entra ID EAM - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
7 months ago Securityboulevard.com
COTI Announces Upcoming V2 Airdrop Campaign Worth +10M USD - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
9 months ago Hackread.com
Norway Recommends Replacing SSLVPN to Stop Cyber Attacks - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
7 months ago Gbhackers.com
Amazon Is Investigating Perplexity Over Claims of Scraping Abuse - Amazon's cloud division has launched an investigation into Perplexity AI. At issue is whether the AI search startup is violating Amazon Web Services rules by scraping websites that attempted to prevent it from doing so, WIRED has learned. An AWS ...
5 months ago Wired.com
Cyber Security News Weekly Round-Up Vulnerabilities, Cyber Attacks & Stories - Quickly knowing about new cyber risks and attack vectors lets you immediately strengthen your defenses and preventive measures. Some recommendations include not allowing direct root user logins and also relocating default SSH ports for enhanced ...
7 months ago Cybersecuritynews.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)