We regularly face attempts to gain unauthorized access or deliver malicious software to Akamai Connected Cloud and our internal IT systems, with the goal of stealing proprietary information related to our business, products, employees and customers; disrupting our systems and services or those of our customers or others; or demanding ransom to return control of such systems and services. These attempts take a variety of forms, including Distributed Denial of Service (DDoS) attacks, infrastructure attacks, botnets, malicious file uploads, application abuse, credential abuse, social engineering, ransomware, bugs, viruses, worms and malicious software programs. Additionally, the use of artificial intelligence by bad actors has heightened the sophistication and effectiveness of these types of attacks. There have in the past and could in the future be attempts to infiltrate our systems through our supply chain and contractors. Malicious actors are known to attempt to fraudulently induce employees and suppliers to disclose sensitive information through illegal electronic spamming, phishing or other tactics. Other parties may attempt to gain unauthorized physical access to our facilities in order to infiltrate our internal-use information systems. Furthermore, nation state and hacktivist attacks against us or our customers have in the past and may in the future intensify during periods of heightened geopolitical tensions or armed conflict, such as the ongoing war in Ukraine and the Israel-Hamas War. We may not be able to anticipate the techniques used in such attacks, as they change frequently and may not be recognized until launched. While we have, from time to time, experienced threats to and breaches of our and our third-party vendors' data and systems, to date , to our knowledge, cyber threats and other attacks have not resulted in any material adverse effect to our business or operations, but such threats are constantly evolving, increasing the difficulty of detecting and successfully defending against them.
The complexities in managing the security profile of a distributed network with vast scale and geographic reach that evolves to incorporate new capabilities expose us to both known and unknown vulnerabilities. We have discovered vulnerabilities in software used in our technology, such as the vulnerability in Apache Log4j 2 referred to as "Log4Shell" identified in late 2021 that impacted a large portion of the internet ecosystem, and may have other undiscovered vulnerabilities. Vulnerabilities, resident in either software or configurations, have in the past and may in the future require significant operational efforts to mitigate and may persist for extended periods of time and the effects of any such vulnerability could be exacerbated. Similar security risks exist with respect to acquired companies, our business partners and the third-party vendors that we rely on for aspects of our information technology support services and administrative functions. As a result, we are subject to risks that the activities of our business partners and third-party vendors may adversely affect our business even if an attack or breach does not directly target our systems.
To protect our corporate and deployed networks, we aim to continuously engineer more secure solutions, enhance security and reliability features, improve the deployment of software updates to address security vulnerabilities, develop mitigation technologies that help to secure customers from attacks and maintain the digital security infrastructure that protects the integrity of our network and services. For example, our ongoing efforts to continually enhance the security and reliability of Akamai Connected Cloud, customer applications, and corporate systems comprise various initiatives and mitigation efforts, including but not limited to upgrading access and configuration controls; improving security instrumentation, monitoring, detection and prevention tools; enhancing software inventory and tracking and patching systems; upgrading encryption processes and protections; enhancing authorization methods in applications; enhancing data loss prevention and endpoint security management capabilities; upgrading vulnerability identification, assessment, and remediation processes and technologies; and enhancing the security of passwords and other credentials, as applicable and appropriate. Our efforts to engineer more secure solutions are frequently costly, with a negative impact on near-term profitability, and may be unsuccessful in preventing security incidents that may have an adverse effect on our business and reputation.
For example, with the acquisition of Linode, we continue to adapt procedures for mitigating risks that have in the past or may in the future materialize, including any harms that may arise from abuse of our compute products. If we fail to mitigate these harms or if there is a significant cybersecurity event using our compute products or our compute products are perceived to be less reliable than our competitors, it could result in loss of customers and reputational damage.
Any actual, alleged or perceived breach of network security in our systems or networks, or any other actual, alleged or perceived compromise of data security incident we, our customers or our third-party suppliers suffer, can result in damage to our reputation; negative publicity; loss of channel partners, customers and sales; loss of revenue; loss of competitive advantages; increased costs to remedy any problems and otherwise respond to any incident; regulatory investigations and enforcement actions and fines; costly litigation; and other liabilities.