Home  /  Podcast Directory  /  Technology  /  prolexic Podcast


Last update: 2014-07-30

DDoS Attack Threats | DNS Flooder Attack Toolkit | Prolexic

2014-07-30

www.prolexic.com
By exploiting vulnerable DNS servers – or setting up their own – malicious actors can launch powerful DDoS reflection attacks using the new DNS Flooder cybercrime toolkit. The toolkit exploits nuances of the DNS protocol to amplify attacks by a factor of 50 or more, while making the attacker almost entirely anonymous. Find out more about this DDoS threat in the full Prolexic DNS Flooder Threat Advisory

x

Share: DDoS Attack Threats | DNS Flooder Attack Toolkit | Prolexic


DDoS Attack Spotlight | Q1 2014 DDoS Trends | Prolexic Podcast

2014-07-17

http://www.prolexic.com | In Q1 2014, DDoS attackers chose a new and powerful DDoS technology to launch their attacks – enabling the largest attack ever to cross the Prolexic (now part of Akamai) mitigation network. Find out more about the most popular industry targets, techniques, trends and other cyber-threat statistics in the full Prolexic Q1 2014 DDoS attack report

x

Share: DDoS Attack Spotlight | Q1 2014 DDoS Trends | Prolexic Podcast


Cyber Attackers Launching Attacks — Prolexic

2014-06-19

Cyber Attackers Launching Attacks — Prolexic

Cyber attackers are choosing reflection, not infection, to launch high-bandwidth attacks. For more information listen to this audio from Prolexic

x

Share: Cyber Attackers Launching Attacks — Prolexic


Q1 2014 Global Attack Report: WordPress Pingback Abuse

2014-06-19

Q1 2014 Global Attack Report: WordPress Pingback Abuse

This audio goes into depth about how DDoS attackers have been able to use the pingback function in the WordPress publishing platform to take over an attack target with millions of connection requests.

x

Share: Q1 2014 Global Attack Report: WordPress Pingback Abuse


Q1 2014 Global Attack Report: Industry Targets

2014-06-17

Q1 2014 Global Attack Report: Industry Targets

This audio gives details on DDoS attacks — specifically in Q1 2014, where Media and Entertainment took the most impact of DDoS attacks.

x

Share: Q1 2014 Global Attack Report: Industry Targets


DDoS Attacks Against Global Markets | DDoS Cyber-Attack | Prolexic Podcast

2014-05-04

www.prolexic.com

The economic infrastructure provided by financial firms, including trading platforms, is essential to national economies. So that leads to the question: Are DDoS cyber attackers trying to manipulate stock prices and trading markets? The experts in PLXsert think so. Find out more about this threat to the financial industry in this  short audio podcast from Prolexic.

x

Share: DDoS Attacks Against Global Markets | DDoS Cyber-Attack | Prolexic Podcast


Prolexic now apart of Akamai: NTP Amplification DDoS Toolkit

2014-04-15

ProlexicDDoS

Prolexic now apart of Akamai threat advisory about NTP amplification DDoS attacks includes an analysis of how it generates a monlist payload, along with DDoS protection and mitigation techniques, and a review of two DDoS attack campaigns using NTP amplification techniques.

x

Share: Prolexic now apart of Akamai: NTP Amplification DDoS Toolkit


Delivering Effective DDoS Protection

2014-03-11

Prolexic DDOS Protection

choosing a DDoS protection provider is  a critical business decision. Getting it wrong can have a devastating impact on a company’s bottom line and global reputation. These are the 10 factors to consider when choosing . depth of experience, dedicated mitigation capacity, and human expertise on the front lines of the fight against DDoS. All 10 are explained more thoroughly in the white paper.

x

Share: Delivering Effective DDoS Protection


Prolexic DDoS Attack Report: Q4 2013 DDoS Attack Trends and Statistics

2014-02-16

Prolexic DDos Attacks

Q4 2013 set new records for the frequency and size of DDoS attacks, with one notable attack peaking at 179 Gbps. This would be a crippling DDoS attack for most organizations. Q4 also saw significant growth in the misuse of the CHARGEN and NTP protocols in distributed reflection DDoS attacks, while mobile devices started to play a significant role in an attack campaigns. Get more DDoS attack stats and trends in this short podcast (2:51).

x

Share: Prolexic DDoS Attack Report: Q4 2013 DDoS Attack Trends and Statistics


The Growing DDoS Attack Threat from Asia

2014-02-11

DDOS Attack
Recent years have marked a significant rise in distributed denial of service (DDoS) activity from Asia with targets within the region and around the world. Prolexic has observed malicious actors compromising Chinese and other Asian IT resources and using them as command and control (CnC) and zombies in DDoS botnets. In fact, in Q4 2013, six the top ten source countries for DDoS activity were in Asia. Learn more about the Asian DDoS threat in this podcast. (2:37)}

x

Share: The Growing DDoS Attack Threat from Asia


A Multi-Vector DDoS Attack Spotlight

2014-02-11

DDoS Attacks
Multi-vector DDoS attack campaigns make DDoS mitigation more difficult. Multiple attack vectors make it less likely the attack can be blocked with automated devices. In addition, the DDoS mitigation team has to track more details and to fight the attack on multiple fronts simultaneously. In this podcast, Prolexic examines a Q4 2013 DDoS attack that involved a dozen attack vectors, and explains how they fought back. (2:37)

x

Share: A Multi-Vector DDoS Attack Spotlight


Man, Machine and DDoS Mitigation: A Case for Human Cyber Security Expertise

2014-02-10

Prolexic DDos Mitigation
DDoS mitigation appliances alone are not enough to stop today’s large, brute force DDoS attacks. Attackers can overwhelm and sidestep static devices in several ways. In Prolexic’s experience, most tools available today to fight against DDoS attacks are missing the most important part of the solution – the experience of an expert security engineer. In this short podcast, Prolexic explains why you need human security expertise in today’s threat landscape (2:42).

x

Share: Man, Machine and DDoS Mitigation: A Case for Human Cyber Security Expertise


What eCommerce Companies Look for in a DDoS Mitigation Service

2014-01-20

http://www.prolexic.com | In a recent survey, online retailers shared their opinions on the Distributed Denial of Service (DDoS) threat landscape, the likelihood of attacks and the reliability of various DDoS protection and mitigation options. Get the survey results in this short podcast (2:35)

x

Share: What eCommerce Companies Look for in a DDoS Mitigation Service


How SYN Reflection DrDoS Attacks Work and Why They are on the Rise

2014-01-20

http://www.prolexic.com | SYN reflection attacks are one of the more sophisticated distributed denial of service (DDoS) attack methods and typically require some skill to execute. However, they have recently grown in popularity as they have become available as a DDoS-as-a-Service application from the criminal underground. Now even novices can launch a SYN reflection attack. Learn more about this threat in this podcast. (2:45)

x

Share: How SYN Reflection DrDoS Attacks Work and Why They are on the Rise


How Criminals Hijack Printers and Routers to Launch DDoS Attacks

2013-11-25

www.prolexic.com | A growing trend in cyber attacks are distributed reflection denial of service (DrDos) which leverage IP-based devices such as printers and routers. By taking advantage of the functionality of the SNMP, NTP and CHARGEN protocols, attackers can turn mild-mannered network devices into malicious attacking bots. Learn more about this threat in this podcast. (2:31)

x

Share: How Criminals Hijack Printers and Routers to Launch DDoS Attacks


prolexic Podcast

Prolexic Technologies is the world’s largest, most trusted distributed denial of service (DDoS) protection and mitigation provider.

prolexic Podcast


Switch to our mobile site