January 20, 2021

I am a security researcher who has identified over 300 vulnerabilities in software. AMA!

Hi all,

The next thread in our AMA Series features a Security Researcher from Akamai. Thanks to /u/brnbabybrn_cyber for their responses in the Security Assurance AMA. Didn’t get as many hits as we expected – so be sure to [check the thread out](https://www.reddit.com/r/cybersecurity/comments/kwgy47/ama_series_security_assurance/) and post any questions if you have it!

Below is the introduction from Larry:


Hey‌ ‌Reddit!‌ ‌

I’m‌ ‌Larry‌ ‌Cashdollar‌ ‌(yes,‌ ‌that’s‌ ‌my‌ ‌real‌ ‌name),‌ ‌/u/_larry0,‌ ‌and‌ ‌I‌ ‌work‌ ‌at‌ ‌Akamai‌ ‌as‌ ‌a‌ ‌member‌ ‌of‌ ‌the‌ ‌‌[Security‌ ‌Intelligence‌ ‌Response‌ ‌Team‌‌](https://blogs.akamai.com/2015/09/test-post.html?utm_source=reddit&utm_medium=social_corporate) ‌(SIRT).‌ ‌I’ve‌ ‌been‌ ‌a‌ ‌researcher‌ ‌since‌ ‌1998‌ ‌and‌ ‌my‌ ‌research‌ ‌has‌ ‌been‌ ‌covered‌ ‌by‌ ‌‌[ZDnet‌](https://www.zdnet.com/article/malware-creates-online-stores-on-top-of-hacked-wordpress-sites/),‌ ‌‌[The‌ ‌Register‌](https://www.theregister.com/2019/07/29/hackers_akamai_researcher/),‌ ‌‌[Bleeping‌ ‌Computer‌](https://www.bleepingcomputer.com/news/security/new-phishing-attack-uses-google-translate-as-camouflage/),‌ ‌‌[Dark‌ ‌Reading‌](https://www.darkreading.com/edge/theedge/an-uncommon-20-years-of-commonly-enumerating-vulns/b/d-id/1339198).‌ ‌

SIRT‌ ‌is‌ ‌a‌ ‌dedicated‌ ‌group‌ ‌of‌ ‌cyber‌ ‌threat‌ ‌researchers,‌ ‌analysts‌ ‌and‌ ‌incident‌ ‌responders‌ ‌at‌ ‌
Akamai‌ ‌that‌ ‌monitors‌ ‌malicious‌ ‌cyber‌ ‌threats‌ ‌globally‌ ‌and‌ ‌analyzes‌ ‌attacks‌ ‌using‌ ‌proprietary‌ ‌
techniques.‌ ‌

Through‌ ‌research,‌ ‌digital‌ ‌forensics,‌ ‌real‌ ‌time‌ ‌and‌ ‌post-event‌ ‌analysis‌ ‌we‌ ‌build‌ ‌a‌ ‌global‌ ‌view‌ ‌of‌ ‌
security‌ ‌threats,‌ ‌vulnerabilities,‌ ‌tactics,‌ ‌techniques‌ ‌and‌ ‌procedures‌ ‌(TTPs)‌ ‌as‌ ‌well‌ ‌as‌ ‌trends‌ ‌
which‌ ‌are‌ ‌shared‌ ‌with‌ ‌Akamai‌ ‌customers‌ ‌and‌ ‌the‌ ‌wider‌ ‌security‌ ‌community.‌ ‌We‌ ‌identify‌ ‌the‌ ‌
sources‌ ‌and‌ ‌associated‌ ‌attributes‌ ‌of‌ ‌individual‌ ‌attacks,‌ ‌along‌ ‌with‌ ‌analysis‌ ‌to‌ ‌identify‌ ‌and‌ ‌
mitigate‌ ‌future‌ ‌threats.‌ ‌ ‌

Even‌ ‌after‌ ‌23‌ ‌years,‌ ‌I‌ ‌still‌ ‌enjoy‌ ‌finding‌ ‌vulnerabilities.‌ ‌I‌ ‌also‌ ‌spend‌ ‌some‌ ‌of‌ ‌my‌ ‌time‌ ‌helping‌ ‌
other‌ ‌researchers‌ ‌get‌ ‌CVE‌ ‌numbers‌ ‌assigned‌ ‌and‌ ‌disclose‌ ‌vulnerabilities‌ ‌they’ve‌ ‌discovered‌ ‌
responsibly.‌ ‌My‌ ‌position‌ ‌in‌ ‌the‌ ‌Akamai‌ ‌SIRT‌ ‌allows‌ ‌me‌ ‌to‌ ‌protect‌ ‌Akamai’s‌ ‌network‌ ‌and‌ ‌our‌ ‌
customers‌ ‌while‌ ‌also‌ ‌contributing‌ ‌to‌ ‌the‌ ‌security‌ ‌of‌ ‌the‌ ‌internet‌ ‌as‌ ‌a‌ ‌whole.‌ ‌I‌ ‌finally‌ ‌understand‌ ‌
the‌ ‌saying,‌ ‌”do‌ ‌what‌ ‌you‌ ‌love‌ ‌and‌ ‌you’ll‌ ‌never‌ ‌work‌ ‌a‌ ‌day‌ ‌in‌ ‌your‌ ‌life.”‌ ‌

You‌ ‌can‌ ‌check‌ ‌out‌ ‌more‌ ‌of‌ ‌my‌ ‌research‌ ‌on‌ ‌the‌ ‌‌[Akamai‌ ‌blog‌](https://blogs.akamai.com/sitr/author/larry-cashdollar/?utm_source=reddit&utm_medium=social_corporate).‌ ‌

Ask‌ ‌me‌ ‌anything‌ ‌about…‌ ‌my‌ ‌work‌ ‌as‌ ‌a‌ ‌researcher,‌ ‌uncovering‌ ‌a‌ ‌vulnerability‌ ‌used‌ ‌to‌ ‌access‌ ‌
classified‌ ‌CAD‌ ‌drawings‌ ‌of‌ ‌US‌ ‌naval‌ ‌ships,‌ ‌setting‌ ‌traps‌ ‌for‌ ‌hackers‌ ‌and‌ ‌helping‌ ‌make‌ ‌the‌ ‌
internet‌ ‌a‌ ‌safer‌ ‌place.‌ ‌

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.