Arming the Defenders: A SOTI Report for Those Who Protect the Enterprise

Mitch Mayne

Written by

Mitch Mayne

February 11, 2025

Mitch Mayne

Written by

Mitch Mayne

Mitch Mayne is a well-known voice in the cybersecurity realm and is the author of several thought leadership articles and threat intelligence reports. He has also hosted multiple successful podcast series and has worked as an incident responder to deliver proactive and reactive communication plans to help clients prepare for and respond to a data breach. At Akamai, he directs the threat intelligence and cybersecurity research teams to deliver comprehensive analyses and reports that enable clients, policymakers, and industry colleagues to stay safer from cybercriminals.

Mitch uses his background in journalism to specialize in translating rich technical content into actionable, consumable information for the everyday business user. He holds a Master’s degree in Communication and Media from Stanford University.

The goal is simple: To arm you with the real-world strategies you need to safeguard your systems.
The goal is simple: To arm you with the real-world strategies you need to safeguard your systems.

Hats off to the defenders. First-line cybersecurity defenders must simultaneously monitor emerging threats, master new defensive technologies, absorb constant research updates, and recognize old threats in new forms — all while maintaining 24/7 vigilance over an organizations' digital assets. Fulfilling that mission requires a clear-eyed view of today’s rapidly evolving threat landscape, together with an understanding of the latest practices for countering those threats.

And the stakes are high: The half-life of a professional skill is estimated to be just five years — and it's even shorter for technical skills in cybersecurity. Without continuous learning, cybersecurity professionals can become less effective in as little as three months.

That’s what this year’s first State of the Internet (SOTI) report — Defenders’ Guide 2025 — is all about. The report deviates from our usual SOTI format by going beyond the trends to provide actionable insights from security experts who battle cyberthreats every day. The goal is simple: To arm you with the real-world strategies you need to safeguard your systems in today’s increasingly complex digital landscape. 

This one is for the defenders

The content in this SOTI is unique, based on new, original Akamai research. The format is also fresh, reflecting a security-in-depth framework that focuses on three key areas: risk management, network architecture and host security. Each section is packed with proactive measures to improve your threat readiness through a research-driven cybersecurity strategy.

You can download the full Defenders’ Guide 2025 now to get the deep dive. In the meantime, here are some highlights.

Risk management

Risk scoring methodology

The report outlines a new risk scoring methodology developed by Akamai researchers that was designed to quantify both internal and external risks. The methodology is the result of extensive analysis of endpoint exposure and other factors, and it addresses the challenges of risk register creation and quantification. 

It calculates the likelihood of compromise for externally exposed assets and the probability of lateral movement across internal assets. The resulting security score is invaluable for planning mitigation strategies such as endpoint security and microsegmentation rules.

Metamorphosis of malware

The report also provides a fresh look at the metamorphosis of malware, including a detailed analysis of sophisticated botnet families such as NoaBot, FritzFrog, and RedTail. Our researchers identified common vulnerabilities and modern attack capabilities, from peer-to-peer architectures and fileless malware to cryptomining techniques used to generate cryptocurrency ransoms. 

Based on this evidence, the report includes information on botnet detection tools and practical mitigation strategies, including network segmentation, comprehensive patch management, regular backups, and ongoing employee cybersecurity training.

Network architecture

VPN abuse

The report includes new research on VPN abuse, an especially hot topic given the recent increases in this activity. The report explores how VPN appliances have emerged as a key architectural vulnerability ripe for exploitation. A detailed analysis on how attackers crack open and abuse VPNs provides a clear understanding of the increasingly sophisticated techniques in play. Key vulnerabilities include:

  • Authentication bypasses

  • Remote code execution flaws

  • Extraction of configuration data

  • Default configurations and hard-coded encryption keys

The report examines mitigation strategies, including monitoring VPN configuration changes, limiting service account permissions, using dedicated identities for VPN authentication, and employing Zero Trust Network Access principles.

Cross-site scripting

Cross-site scripting (XSS) remains a major threat to web applications. This SOTI report examines this class of JavaScript injection attacks based on a detailed technical analysis of real-world XSS attacks in 2024. Our research identified sophisticated exploitation techniques, including remote resource injection, cookie stealing, website defacement, and session riding attacks. Although more than 98% of remote JavaScript references were legitimate, the remaining percentage represented a variety of attack vectors.

Our findings underscore the need for multilayered defensive measures — including vulnerability scanning, web application firewalls, and proper encoding of user-controlled parameters — to address increasingly sophisticated XSS attack techniques.

Host security

Kubernetes

While containers like Kubernetes offer tremendous flexibility, they also present novel security challenges. Our researchers took a close look at Kubernetes and found no fewer than six Common Vulnerabilities and Exposures (CVEs) that allow for command injection attacks that could lead to complete takeover of the Kubernetes cluster. The research team also identified a design flaw in the git-sync sidecar project that can allow for sensitive data exfiltration or persistent execution.

To mitigate these threats, the report recommends implementing comprehensive security policies, including Pod Security Policies, network policies, and runtime security measures. Additional mitigation strategies involve role-based access control, threat hunting techniques, and using tools like Open Policy Agent for policy-based actions. Our research underscores the importance of regular patching and maintaining vigilance against emerging threats in Kubernetes environments.

Equipping the defenders

Based on cutting-edge research from hundreds of Akamai cybersecurity experts, the SOTI Defenders’ Guide 2025 report provides an in-depth view of current cyberthreats, together with actionable steps to safeguard systems from today’s fire hose of attacks by combining proactive steps with improved reactive response.  

The comedian W.C. Fields once quipped, “I don't have to attend every argument I'm invited to.” Likewise, taking a security-in-depth approach that encompasses risk management, network architecture, and host security can allow today’s defenders to choose not to participate in “arguments” with the proliferating horde of threat actors.

Learn more

This is a SOTI report unlike any other. Download Defenders’ Guide 2025 now and get the full story.



Mitch Mayne

Written by

Mitch Mayne

February 11, 2025

Mitch Mayne

Written by

Mitch Mayne

Mitch Mayne is a well-known voice in the cybersecurity realm and is the author of several thought leadership articles and threat intelligence reports. He has also hosted multiple successful podcast series and has worked as an incident responder to deliver proactive and reactive communication plans to help clients prepare for and respond to a data breach. At Akamai, he directs the threat intelligence and cybersecurity research teams to deliver comprehensive analyses and reports that enable clients, policymakers, and industry colleagues to stay safer from cybercriminals.

Mitch uses his background in journalism to specialize in translating rich technical content into actionable, consumable information for the everyday business user. He holds a Master’s degree in Communication and Media from Stanford University.