<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Bot Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/bot/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/bot/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:11:51 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Bot Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/bot/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 093 Botnets</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-093-botnets/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 03 Sep 2021 07:15:13 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Bot]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Botnets]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Compromised Devices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Denial of Service]]></category>
		<category><![CDATA[Denial of Service Attack]]></category>
		<category><![CDATA[Distributed Denial of Service]]></category>
		<category><![CDATA[Distributed Denial of Service Attack]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Shodan]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2597</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 93. This week were going to talk about Botnets. You&#8217;ve mentioned these before Back in #WeekendWisdom number 76, where I talked about connecting devices to the internet and #WeekendWisdom number 84, where I talked about distributed denial-of-service attacks, I mentioned botnets. What are botnets? A botnet is a collection of a&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-093-botnets/">#WeekendWisdom 093 Botnets</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 93. This week were going to talk about Botnets.<span id="more-2597"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2597-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4</a></video></div>
<h3>You&#8217;ve mentioned these before</h3>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-076-connecting-devices-to-the-internet/">#WeekendWisdom number 76</a>, where I talked about connecting devices to the internet and <a href="https://www.l2cybersecurity.com/weekendwisdom-084-distributed-denial-of-service-attacks/" target="_blank" rel="noopener">#WeekendWisdom number 84</a>, where I talked about distributed denial-of-service attacks, I mentioned botnets.</p>
<h3>What are botnets?</h3>
<p>A botnet is a collection of a large amount of compromised devices that are connected to the internet.</p>
<h3>How do they get formed?</h3>
<p>There are legitimate services out there that scan the entire internet and every device that is connected to it and it keeps a database of all these devices.</p>
<p>Criminals then using these legitimate services are able to tailor their searches and locate:</p>
<ul>
<li>CCTV cameras</li>
<li>Baby monitors</li>
<li>Digital video recorders</li>
<li>In-house IP cameras</li>
<li>Any other type of device that may be connected to the internet in a very insecure manner</li>
</ul>
<p>If they can detect these through this database, what they can do then is compromises it using maybe:</p>
<ul>
<li>Default credentials</li>
<li>Known compromise</li>
<li>Weak vulnerabilities</li>
</ul>
<p>in those devices. Take them over, add them to their botnet and then they have control of these devices. They give them instructions to carry out a distributed denial of service attack.</p>
<p>So that&#8217;s how these botnets get formed.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-093-botnets/">#WeekendWisdom 093 Botnets</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4" length="30869996" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 075 Backdoors</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 23 Apr 2021 01:15:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Backdoors]]></category>
		<category><![CDATA[Bot]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Persistence]]></category>
		<category><![CDATA[Persistent Access]]></category>
		<category><![CDATA[RAT]]></category>
		<category><![CDATA[Remote Access Trojan]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2500</guid>

					<description><![CDATA[<p>come to #WeekendWisdom number 75. This week we&#8217;re going to talk about Backdoors. Where does this term Backdoors come from? A lot of cyber security terminology uses common terms that relate to the real-world. In the real-world, a backdoor is usually the door of a house or building that is around the side or the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/">#WeekendWisdom 075 Backdoors</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>come to #WeekendWisdom number 75. This week we&#8217;re going to talk about Backdoors.<span id="more-2500"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2500-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4</a></video></div>
<h3>Where does this term Backdoors come from?</h3>
<p>A lot of cyber security terminology uses common terms that relate to the real-world. In the real-world, a backdoor is usually the door of a house or building that is around the side or the back. This door cannot seen from the front of the building.</p>
<h3>In cyber security terminology?</h3>
<p>In cyber security terms a backdoor is a way in that is unseen, into an appliance or device or to a network.</p>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-061-zyxel-backdoor/" target="_blank" rel="noopener">#WeekendWisdom number 61</a>, I talked about a backdoor to a set of firewalls. This was where the manufacturer had put in place a hardcoded password. This password enabled them to be able to sign into those firewalls through the backdoor.</p>
<h3>What way can hackers use Backdoors?</h3>
<p>But hackers tend to use a bit more sophisticated methods to establish their backdoors. If they break into your network they usually want to try and keep their access on there. So they will usually install some program, some piece of software on one of the devices on the network to establish what we call a persistent connection, where they can just keep coming back.</p>
<p>That&#8217;s just a piece of software that opens up a backdoor. Sets up a communication with the outside world that the hacker controls and that they can use to come back in and continue doing whatever they want to do on your network.</p>
<p>So that&#8217;s what a backdoor is in cyber security terms.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/">#WeekendWisdom 075 Backdoors</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4" length="33413833" type="video/mp4" />

			</item>
	</channel>
</rss>
