Episodes
Thursday Jul 31, 2014
Thursday Jul 31, 2014
www.prolexic.comBy exploiting vulnerable DNS servers – or setting up their own – malicious actors can launch powerful DDoS reflection attacks using the new DNS Flooder cybercrime toolkit. The toolkit exploits nuances of the DNS protocol to amplify attacks by a factor of 50 or more, while making the attacker almost entirely anonymous. Find out more about this DDoS threat in the full Prolexic DNS Flooder Threat Advisory
Thursday Jul 17, 2014
Thursday Jul 17, 2014
http://www.prolexic.com | In Q1 2014, DDoS attackers chose a new and powerful DDoS technology to launch their attacks – enabling the largest attack ever to cross the Prolexic (now part of Akamai) mitigation network. Find out more about the most popular industry targets, techniques, trends and other cyber-threat statistics in the full Prolexic Q1 2014 DDoS attack report
Thursday Jun 19, 2014
Thursday Jun 19, 2014
Cyber Attackers Launching Attacks -- ProlexicCyber attackers are
choosing reflection, not infection, to launch high-bandwidth attacks. For more
information listen to this audio from Prolexic
Thursday Jun 19, 2014
Thursday Jun 19, 2014
Q1 2014 Global Attack Report: WordPress Pingback Abuse
This audio goes into depth about how DDoS attackers have
been able to use the pingback function in the WordPress publishing platform to
take over an attack target with millions of connection requests.
Tuesday Jun 17, 2014
Tuesday Jun 17, 2014
Q1 2014 Global Attack Report: Industry Targets
This audio gives details on DDoS attacks -- specifically in
Q1 2014, where Media and Entertainment took the most impact of DDoS attacks.
Sunday May 04, 2014
Sunday May 04, 2014
www.prolexic.com
The economic infrastructure
provided by financial firms, including trading platforms, is essential to
national economies. So that leads to the question: Are DDoS cyber attackers
trying to manipulate stock prices and trading markets? The experts in PLXsert think
so. Find out more about this threat to the financial industry in this short audio podcast from Prolexic.
Tuesday Apr 15, 2014
Tuesday Apr 15, 2014
ProlexicDDoS
Prolexic now apart of Akamai threat advisory about NTP
amplification DDoS attacks includes an analysis of how it generates a monlist
payload, along with DDoS protection and mitigation techniques, and a review of
two DDoS attack campaigns using NTP amplification techniques.
Wednesday Mar 12, 2014
Wednesday Mar 12, 2014
Prolexic DDOS Protection
choosing a DDoS protection
provider is a critical business
decision. Getting it wrong can have a devastating impact on a company’s bottom
line and global reputation. These are the 10 factors to consider when choosing
. depth of experience, dedicated mitigation capacity, and human expertise on
the front lines of the fight against DDoS. All 10 are explained more thoroughly
in the white paper.
Sunday Feb 16, 2014
Sunday Feb 16, 2014
Prolexic DDos Attacks
Q4 2013 set new records for the frequency and size of DDoS attacks,
with one notable attack peaking at 179 Gbps. This would be a crippling DDoS
attack for most organizations. Q4 also saw significant growth in the misuse of
the CHARGEN and NTP protocols in distributed reflection DDoS attacks, while
mobile devices started to play a significant role in an attack campaigns. Get
more DDoS attack stats and trends in this short podcast (2:51).
Wednesday Feb 12, 2014
Wednesday Feb 12, 2014
DDOS AttackRecent years have marked a significant rise in distributed
denial of service (DDoS) activity from Asia with targets within the region and
around the world. Prolexic has observed malicious actors compromising Chinese
and other Asian IT resources and using them as command and control (CnC) and
zombies in DDoS botnets. In fact, in Q4 2013, six the top ten source countries
for DDoS activity were in Asia. Learn more about the Asian DDoS threat in this
podcast. (2:37)}