Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/7/2013
10:06 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Prolexic Tracks More Than 47 Million DDoS Attack Bots Worldwide; Public Portal Now Available

Information on the number of bots, along with trend details on attack types and attack locations is available in PLXpatrol

HOLLYWOOD, FL – (May 7, 2013) – Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that it tracks more than 47 million bots in its global IP reputational database. Each time a bot is used in a DDoS attack against a Prolexic client, the bot’s IP address and location are logged and tracked. Information on the number of bots, along with trend details on attack types and attack locations is now available in PLXpatrol, the company’s free public DDoS attack portal, at www.prolexic.com/plxpatrol.

Since its launch in Q4 2012, PLXpatrol has been providing up-to-the-minute intelligence and insight on DDoS threats to the world’s IT and security community. The information presented in PLXpatrol is sourced from Prolexic’s analytical and IP reputational databases.

“Version 2.0 builds on the very successful launch of PLXpatrol and provides more views and more data,” said Stuart Scholly, president at Prolexic. “With this free tool, users have the ability to drill down and get deeper insight on DDoS attacks, both historically and in near real-time.”

The first release of PLXpatrol included an Attack Tracker, showing where DDoS attacks directed against Prolexic’s clients were originating from and geographic locations of targets (anonymized). Additional views included Country Ranking (last 24 hours) and Country Ranking (All Time). Key additions in PLXpatrol 2.0 include:

Attack Tracker (Enhancement) – This tool has been enhanced with an optional three-dimensional view of attacks sources and destinations, along with details on the number of recent attacks originating in each country

Attack Types (New Feature) – This new tool shows the most common attack vectors being used in DDoS attacks over the last 30 days and all-time (since Prolexic has been tracking attack types).

“Prolexic is sitting on a wealth of Big Data DDoS threat and Internet Protocol intelligence,” said Scholly. “We are sharing this insight with the global IT and security community through PLXpatrol and will continue to build out the tool as the year progresses.”

PLXpatrol 2.0 can be used for free at www.prolexic.com/plxpatrol.

About Prolexic

Prolexic is the world’s largest, most trusted Distributed Denial of Service (DDoS) mitigation provider. Able to absorb the largest and most complex attacks ever launched, Prolexic restores mission-critical Internet-facing infrastructures for global enterprises and government agencies within minutes. Ten of the world’s largest banks and the leading companies in e-Commerce, SaaS, payment processing, travel/hospitality, gaming and other at-risk industries rely on Prolexic to protect their businesses. Founded in 2003 as the world’s first in-the-cloud DDoS mitigation platform, Prolexic is headquartered in Hollywood, Florida and has scrubbing centers located in the Americas, Europe and Asia. To learn more about how Prolexic can stop DDoS attacks and protect your business, please visit www.prolexic.com, follow us on LinkedIn, Facebook, Google+ , YouTube , and @Prolexic on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-25273
PUBLISHED: 2021-07-29
Stored XSS can execute as administrator in quarantined email detail view in Sophos UTM before version 9.706.
CVE-2021-36741
PUBLISHED: 2021-07-29
An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the ...
CVE-2021-36742
PUBLISHED: 2021-07-29
A improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG and Worry-Free Business Security 10.0 SP1 allows a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privile...
CVE-2021-23418
PUBLISHED: 2021-07-29
The package glances before 3.2.1 are vulnerable to XML External Entity (XXE) Injection via the use of Fault to parse untrusted XML data, which is known to be vulnerable to XML attacks.
CVE-2020-5329
PUBLISHED: 2021-07-29
Dell EMC Avamar Server contains an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links.