The RLT Blog - Page 16 of 16 - Root Level Technology

The RLT Blog - Page 16 of 16 - Root Level Technology

How Can High-Risk Industries Defend Themselves From DDoS Attacks?

No one is immune to cyberattacks. As technology continues to march forward and more critical data is stored online, more criminals than ever are targeting businesses through digital vectors. The threat landscape has never been more diverse, nor has the risk of an attack ever been higher. It is extremely difficult to mount a defense on all fronts. A business that’s well-equipped to protect against worms and malware, for example, may not be able to mitigate advanced persistent threats or information theft. Similarly, a business that’s geared to prevent information theft might not have proper DDoS defenses in place. Attackers know this, and many now target multiple vectors when attacking an organization. All they need is for one vector to […]

Continue reading

Five Things You Need To Know About Hacktivism

Not all cyber-attacks are financially motivated. In the modern day, an increasing number of digital attacks are carried out with the intent of delivering a message. The cyber-criminals behind such attacks — dubbed ‘hacktivists’ — are many and varied, and there are many shades of gray where their motivations are concerned. They’re not out for money, and they can be more persistent than even the greediest hacker. Of course, if your business is unlucky enough to find itself the target of a hacktivist, the ‘why’ of an attack doesn’t matter so much as the ‘how’ of mitigating it and coming through intact. In that regard, the first step is a better understanding of what hacktivists are and how they operate. […]

Continue reading

internet of bots

The Internet of Bots: How A Connected Future Could Give Way To The Biggest Botnets Ever

In October, security firm Imperva reported on a DDoS attack through a somewhat unusual medium. Over 900 CCTV cameras were infected with a variant of a known malware program, and used to flood a cloud service with HTTP requests. The attack peaked at over 20,000 requests per second, according to Computer World. You’ll probably be unsurprised to learn that, of the CCTV cameras compromised in the attack, exactly none of them were properly secured. On the contrary, the vast majority were easily accessible through Telnet or SSH, and all were protected by either default or weak credentials. In other words, they were easy prey for an enterprising hacker. If this news doesn’t have you at least a little wary, you […]

Continue reading