Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

11/17/2011
12:22 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Prolexic Introduces New Service To Provide DDoS Attack Forensics And Analysis

Creates new Security Engineering and Response Team (PLXSERT)

HOLLYWOOD, FL — (November 17, 2011) — Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) mitigation services, today announced that it has created a data forensics and analysis group that will provide detailed pre- and post-attack data to clients as a subscription service. The new group and service is called Prolexic Security Engineering and Response Team (PLXSERT).

Formed in February 2011 as an internal research group, PLXSERT has been providing data forensics to select clients based on its insight into global DDoS threats and activities, as well as specific client attacks. Feedback from clients has been so positive that the service is now being made available on a subscription basis to all Prolexic clients.

“We are on the front lines counteracting more DDoS attacks daily than any other company and this provides a very rich data source to mine,” said Neal Quinn, vice president of Operations at Prolexic. “Our hope is that the data and insight PLXSERT is providing can help organizations make more informed decisions and be proactive in defending against DDoS attacks.”

PLXSERT is currently providing DDoS threat information in two forms. Threat Advisories are being issued to clients on an ad hoc basis, proving insight into specific threats, including steps clients can take to defend against them. PLXSERT is also compiling data on a quarterly basis and will issue attack reports that provide insight into Prolexic’s mitigation activities for the most recent threemonth period, including the volume of attacks, the most common attack types, and countries where attacks are originating. The first attack report for Q3 2011 can be downloaded from www.prolexic.com/attackreports.

The PLXSERT service can provide value to customers both before and after attacks. With intelligence gleaned from monitoring threats around world it is possible to identify botnet characteristics without having received any DDoS traffic. As a result, organizations can be alert and prepared ahead of time before an attack begins. Similarly, deep post-attack analysis can provide best practices to help minimize the impact of future attacks.

“PLXSERT lays the foundation for a more intelligent approach to DDoS monitoring and more successful mitigation,” said Quinn. “What has helped us internally win against DDoS attackers is now being made available to our customers.”

About the Prolexic Security Engineering & Response Team (PLXSERT)

PLXSERT monitors malicious cyber threats globally and analyzes DDoS attacks using proprietary techniques and equipment. Through data forensics and post attack analysis, PLXSERT is able to build a global view of DDoS attacks, which is shared with customers. By identifying the sources and associated attributes of individual attacks, the PLXSERT team helps organizations adopt best practices and make more informed, proactive decisions about DDoS threats.

About Prolexic

Prolexic is the world’s largest, most trusted Distributed Denial of Service (DDoS) mitigation provider. Able to absorb the largest and most complex attacks ever launched, Prolexic restores mission critical Internet facing infrastructures for global enterprises and government agencies within minutes. Six of the world’s ten largest banks and the leading companies in e-Commerce, payment processing, travel/hospitality, gaming and other at- risk industries rely on Prolexic to protect their businesses. Founded in 2003 as the world’s first “in the cloud” DDoS mitigation platform, Prolexic is headquartered in Hollywood, Florida and has scrubbing centers located in the Americas, Europe and Asia. For more information, visit www.prolexic.com.

Contact:

Michael E. Donner SVP, Chief Marketing Officer Prolexic

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
The Data-Centric Path to Zero Trust
Altaz Valani, Director of Insights Research, Security Compass,  1/13/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).