Akamai Announces Content Protector to Stop Scraping Attacks

PRESS RELEASE. CAMBRIDGE, Mass., Feb. 6, 2024 /PRNewswire/ - Akamai Technologies, Inc., the cloud company that powers and protects life online, today announced the availability of Content Protector, a product that stops scraping attacks without blocking the good traffic that companies need to enhance their business.
Scraper bots are a critical and often productive part of the commerce ecosystem.
These bots search for new content, highlight products in comparison sites, and gather updated product information to share with customers.
Scrapers also get used for harmful purposes such as competitive undercutting, surveillance before inventory hoarding attacks, and counterfeiting goods and websites.
Scrapers also ping sites 24/7 unless stopped - so they can degrade site performance, which in turn frustrates consumers and causes them to abandon their visits.
Scrapers have become much more evasive and sophisticated over the past few years.
Akamai Content Protector helps detect and mitigate evasive scrapers that steal content for malicious purposes.
It enables improved site performance, an enhanced user experience and protection of intellectual property while facilitating significantly better detections and fewer false negatives without increasing the rate of false positives.
The product is designed for companies that need to protect their reputation and revenue potential.
Protocol-level assessment: Protocol fingerprinting checks how visitors connect to your site to ensure they're legitimate.
It evaluates how the client establishes the connection with the server at the different layers of the Open Systems Interconnection model - verifying that the parameters negotiated align with the one expected from the most common web browsers and mobile applications.
Application-level assessment: Evaluates if the client can run some business logic written in JavaScript.
When the client runs JavaScript, it collects the device and browser characteristics and user preferences.
These various data points are compared and cross-checked against the protocol-level data to verify consistency.
User interaction: Analyzes user interactions to distinguish between human and bot traffic.
It assesses how users interact with devices such as touch screens, keyboards, and mouse, identifying bots through their lack of interaction or abnormal usage patterns.
User behavior: Monitors visitor behavior on your website to identify unusual patterns indicative of bots.
Risk classification: Provides a deterministic and actionable low-, medium-, or high-risk classification of the traffic, based on the anomalies found during the evaluation.
Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences - helping billions of people live, work, and play every day.
Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away.


This Cyber News was published on www.darkreading.com. Publication date: Tue, 06 Feb 2024 22:50:28 +0000


Cyber News related to Akamai Announces Content Protector to Stop Scraping Attacks

Is Web Scraping Illegal? - Legal actions against web scraping are slow and vary by country, leaving organizations to fend for themselves. Web scraping is a technique to swiftly pull large amounts of data from websites using automated software. Web scraping differs from screen ...
2 years ago Imperva.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
Akamai Announces Content Protector to Stop Scraping Attacks - PRESS RELEASE. CAMBRIDGE, Mass., Feb. 6, 2024 /PRNewswire/ - Akamai Technologies, Inc., the cloud company that powers and protects life online, today announced the availability of Content Protector, a product that stops scraping attacks without ...
1 year ago Darkreading.com
Akamai Named a Gartner Customers’ Choice for WAAP in 2025 - Akamai has been recognized as a Gartner Customers’ Choice for Web Application and API Protection (WAAP) in 2025, underscoring its leadership in cybersecurity solutions. This accolade reflects Akamai's commitment to delivering robust security ...
3 months ago Akamai.com
Akamai discloses zero-click exploit for Microsoft Outlook - While examining a previous bypass mitigation, Akamai Technologies discovered two new Windows vulnerabilities that could allow an attacker to create a zero-click exploit against Microsoft Outlook clients. In a two-part report published Monday, Akamai ...
2 years ago Techtarget.com CVE-2023-35384 CVE-2023-36710 CVE-2023-23397 CVE-2023-29324
Microsoft Outlook Zero-Click Security Flaws Triggered by Sound File - Researchers this week disclosed details on two security vulnerabilities in Microsoft Outlook that, when chained together, give attackers a way to execute arbitrary code on affected systems without any user interaction. Unusually, both of them can be ...
2 years ago Darkreading.com CVE-2023-35384 CVE-2023-23397 Fancy Bear
Attacks abuse Microsoft DHCP to spoof DNS records The Register - A series of attacks against Microsoft Active Directory domains could allow miscreants to spoof DNS records, compromise Active Directory and steal all the secrets it stores, according to Akamai security researchers. We're told the attacks - which are ...
2 years ago Go.theregister.com
Web scraping is not just a security or fraud problem - Bots compose 42% of overall web traffic, and 65% of these bots are malicious, according to Akamai. Negative effects of scraper bots on business operations. Web scraping is not just a fraud or security problem, it is also a business problem. Scraper ...
1 year ago Helpnetsecurity.com
Unix Printing Vulnerabilities Enable Easy DDoS Attacks - "For each packet sent, the vulnerable CUPS server will generate a larger and partially attacker-controlled IPP/HTTP request directed at the specified target." Akamai found that all it takes for someone to launch an attack is to send a ...
1 year ago Darkreading.com CVE-2024-47176 CVE-2024-47076 CVE-2024-47175 CVE-2024-47177
No Robots(.txt): How to Ask ChatGPT and Google Bard to Not Use Your Website for Training - Both OpenAI and Google have released guidance for website owners who do not want the two companies using the content of their sites to train the company's large language models. We've long been supporters of the right to scrape websites-the process ...
2 years ago Eff.org
Reliable, Compliant APIs with Akamai Managed Service API Performance - In today's digital landscape, APIs are critical for seamless integration and data exchange across platforms. However, ensuring these APIs are reliable, secure, and compliant with industry standards is a significant challenge. Akamai's Managed Service ...
3 months ago Akamai.com
Enhancements to Akamai API Security in Q3 2025 - In Q3 2025, Akamai has introduced significant enhancements to its API security offerings, aimed at bolstering protection against evolving cyber threats. These improvements focus on advanced threat detection, automated mitigation, and comprehensive ...
2 months ago Akamai.com
Benchmarking the NVIDIA RTX Pro 6000 Blackwell on the Akamai Cloud - This article explores the performance benchmarking of the NVIDIA RTX Pro 6000 Blackwell GPU within the Akamai Cloud environment. It highlights the advancements in GPU technology and how Akamai leverages this powerful hardware to enhance cloud ...
2 months ago Akamai.com
Experts warn of DDoS attacks using linux printing vulnerability - Benjamin Harris, CEO of cybersecurity firm watchTowr, said CUPS itself is the software that handles printing on a Linux machine, and thus, by virtue of Linux not being a 'desktop' operating system in many environments in the same way that ...
1 year ago Therecord.media
Navigating the New Frontier of AI-Driven Cybersecurity Threats - A few weeks ago, Best Buy revealed its plans to deploy generative AI to transform its customer service function. Best Buy's initiative is a harbinger of generative AI deployment in enterprise settings, aiming to increase productivity and improve ...
1 year ago Securityboulevard.com
New botnet malware exploits two zero-days to infect NVRs and routers - A new Mirai-based malware botnet named 'InfectedSlurs' has been exploiting two zero-day remote code execution vulnerabilities to infect routers and video recorder devices. The malware hijacks the devices to make them part of its DDoS swarm, ...
2 years ago Bleepingcomputer.com
CVE-2025-66373 - Akamai Ghost on Akamai CDN edge servers before 2025-11-17 has a chunked request body processing error that can result in HTTP request smuggling. When Akamai Ghost receives an invalid chunked body that includes a chunk size different from the actual ...
1 month ago
Outlook Plays Attacker Tunes: Vulnerability Chain Leading to Zero-Click RCE - Security researchers at Akamai are sharing details on multiple bypasses for patches Microsoft released for an Outlook zero-click remote code execution vulnerability earlier this year. The original issue, tracked as CVE-2023-23397, was patched by ...
2 years ago Securityweek.com CVE-2023-23397 CVE-2023-29324 CVE-2023-35384 CVE-2023-36710
Recently patched CUPS flaw can be used to amplify DDoS attacks - As Akamai security researchers found, a CVE-2024-47176 security flaw in the cups-browsed daemon that can be chained with three other bugs to gain remote code execution on Unix-like systems via a single UDP packet can also be leveraged to ...
1 year ago Bleepingcomputer.com CVE-2024-47176
Cloudflare Unveils AI Labyrinth: A New Approach to Exhaust AI Crawlers - By turning AI against itself, Cloudflare has developed an innovative solution that protects website content and demonstrates its dedication to safeguarding original content creators from unauthorized data scraping. As AI-generated content continues ...
9 months ago Cybersecuritynews.com
What You Need to Know, What You Need to Do - The war in Ukraine is heating up again in recent days with multiple missile and drone strikes. The action comes on the heels of Western allies' promises of tank assistance to help push back Russian forces. The battle against cybercriminals is hitting ...
2 years ago Akamai.com
CVE-2018-12886 - stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack ...
5 years ago
CVE-2023-4039 - ...
1 year ago