Profile cover photo
Profile photo
Prolexic Technologies
231 followers -
DDoS Attacks End Here
DDoS Attacks End Here

231 followers
About
Prolexic Technologies's posts

Post has attachment
Prolexic has a new Google+ profile with a new name – State of the Internet. Follow us on our new Google+ account as we continue to provide a steady source of connectivity and cybersecurity information. http://bit.ly/1wXHf1V   #newpage   #cybersecurity   #SOTI  
Photo

Post has attachment
Grandma always said that an ounce of prevention was worth a pound of cure, and her advice rings true even for today’s cybersecurity threats. Our new infographic offers an easy-to-read summary of facts and mitigation techniques to avoid and treat infection by the IptabLes/IptabLex malware. 

View the infographic now: http://bit.ly/1ySAefj #infographic   #infographics   #ddos   #ddosattacks   #cyberthreats   #websecurity   #iptables   #threatadvisory  
Photo

Post has attachment
Our helpful infographic summary of Q3 2014 DDoS attack and network security trends and facts is now available! You’ll see quick facts on average peak attack volume and attack bandwidth, the average length of a DDoS attack, the industries most frequently targeted, what’s driving botnet building, the top five source countries for DDoS attacks, and more.  

View the infographic now and the full report: http://bit.ly/12K96WC #attackreport   #infographic   #infographics   #attackstats   #cybersecurity   #infosec   #ddosattacks   #DDoS  
Photo

Post has attachment
+Network World discusses the latest PLXsert threat advisory on the #Yummba  toolkit and the increasingly complex crimeware kits effecting the financial sector. Full article here now: http://bit.ly/1BgQJYo #networkworld   #crimeware   #cyberattack   #webinjects   #finance   #banking   #threatadvisory  

Post has attachment
• PLXsert has release a high-risk threat advisory. Yummba webinject tools are being used by malicious actors to steal online banking credentials.  On machines compromised with malware such as the Zeus crimeware toolkit, attackers use webinjects to insert custom elements into web pages such that the pages appear legitimate to end users. The altered pages are often used to steal private information when customers use online banking sites. ATSengine is used to automatically transfer funds out of customer accounts. 

The Yummba Webinject Tools Threat Advisory includes PLXsert’s analysis and details, including:
• How webinjects work
• Co-resident malware, such as Zeus and ATSengine
• Potential banking targets
• Analysis of the code
• Types of data stolen 
• Vulnerability mitigation

Download the PLXsert threat advisory at www.stateoftheinternet.com/yummba.

#yummba   #threatadvisory   #websecurity   #finance   #business   #banking   #malware   #infosec  
Photo

Post has attachment
PLXsert has released a security bulletin on crafted DNS attacks, a recent trend in reflection and amplification attacks. Entertainment, education, and high tech consulting firms have been hardest hit.The security bulletin includes PLXsert’s analysis and details, including:
o Overview of new developments in the use of TXT records
o Sample payloads
o Bandwidth and duration statistics for multiple attacks
o Recommendations for mitigation
• Access the security bulletin at: http://bit.ly/112RvJa 
#DNS   #DNSTXT   #advisory   #threat   #threats   #security   #reflection   #websecurity  

Post has attachment
Don’t miss our latest infographic highlighting helpful details on the powerful Blackshades RAT cybersecurity threat. We include quick facts with up-to-date information, share a list of cybercriminal uses for infected machines, and provide seven signs of infection by the Blackshades RAT.  

View the infographic now: http://bit.ly/1yCFZPy #infographic   #infographics   #websecurity   #malware   #blackshades   #threatadvisory   #stateoftheinternet  
Photo

Post has attachment
Download this insightful Analyst Connection  from IDC analysts John Grady, Program Manager, Security Products, and Christina Richmond, Program Director, Infrastructure Security Services: Addressing the Need for Web Application Firewalls. Free access now at:  http://bit.ly/1AbmcvM #idc   #analyst   #whitepaper   #WAF   #firewall  

Post has attachment
Cyber criminals target unprotected web applications, exploiting vulnerabilities by stealing data, launching denial-of-service attacks, and committing other malicious actions. To learn more about how you can enhance traditional security measures with methods designed specifically to protect against these attacks, download this important IDC research report now, free from Akamai: http://bit.ly/1AbmcvM #idc   #analyst   #freepaper   #WAF   #webapplicationfirewall   #firewalls  
Photo

Post has attachment
Akamai security expert Bill Brenner writes about why you should expect more blockbuster vulnerability news this year.  Read the brand new blog on StateoftheInternet.com! #blog   #newblog   #security   #cybersecurity   #poodle  
Wait while more posts are being loaded