<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Botnets Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/botnets/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/botnets/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:11:51 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Botnets Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/botnets/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 093 Botnets</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-093-botnets/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 03 Sep 2021 07:15:13 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Bot]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Botnets]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Compromised Devices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Denial of Service]]></category>
		<category><![CDATA[Denial of Service Attack]]></category>
		<category><![CDATA[Distributed Denial of Service]]></category>
		<category><![CDATA[Distributed Denial of Service Attack]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Shodan]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2597</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 93. This week were going to talk about Botnets. You&#8217;ve mentioned these before Back in #WeekendWisdom number 76, where I talked about connecting devices to the internet and #WeekendWisdom number 84, where I talked about distributed denial-of-service attacks, I mentioned botnets. What are botnets? A botnet is a collection of a&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-093-botnets/">#WeekendWisdom 093 Botnets</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 93. This week were going to talk about Botnets.<span id="more-2597"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2597-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4</a></video></div>
<h3>You&#8217;ve mentioned these before</h3>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-076-connecting-devices-to-the-internet/">#WeekendWisdom number 76</a>, where I talked about connecting devices to the internet and <a href="https://www.l2cybersecurity.com/weekendwisdom-084-distributed-denial-of-service-attacks/" target="_blank" rel="noopener">#WeekendWisdom number 84</a>, where I talked about distributed denial-of-service attacks, I mentioned botnets.</p>
<h3>What are botnets?</h3>
<p>A botnet is a collection of a large amount of compromised devices that are connected to the internet.</p>
<h3>How do they get formed?</h3>
<p>There are legitimate services out there that scan the entire internet and every device that is connected to it and it keeps a database of all these devices.</p>
<p>Criminals then using these legitimate services are able to tailor their searches and locate:</p>
<ul>
<li>CCTV cameras</li>
<li>Baby monitors</li>
<li>Digital video recorders</li>
<li>In-house IP cameras</li>
<li>Any other type of device that may be connected to the internet in a very insecure manner</li>
</ul>
<p>If they can detect these through this database, what they can do then is compromises it using maybe:</p>
<ul>
<li>Default credentials</li>
<li>Known compromise</li>
<li>Weak vulnerabilities</li>
</ul>
<p>in those devices. Take them over, add them to their botnet and then they have control of these devices. They give them instructions to carry out a distributed denial of service attack.</p>
<p>So that&#8217;s how these botnets get formed.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-093-botnets/">#WeekendWisdom 093 Botnets</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4" length="30869996" type="video/mp4" />

			</item>
	</channel>
</rss>
