The RLT Blog

A Look At Some Network-Based DDoS Attacks, And How To Protect Against Them

The Distributed Denial of Service Attack has a long and storied history in the cybersecurity space. Originally based primarily on the TCP and UDP protocols, they’ve since expanded to new horizons, as attackers think of new and creative ways to flood and shut down vulnerable systems. That isn’t to say older attack vectors are entirely obsolete, mind you. It’s important to be aware of some of the DDoS methods of yesterday, in the rare event that they make a comeback – which, as you’ll soon see, has been known to happen. Today, we’re going to discuss two of them Teardrop A Teardrop attack (which is really just a fancy way of saying “ip fragmentation) was a relatively simple thing to […]

Continue reading

Should Your Business Deploy A Modular Data Center?

Traditionally, deploying a data center isn’t the sort of thing just anyone can handle. It’s an extensive, laborious process, requiring a massive cost investment, a healthy dollop of technical knowledge, and a plethora of rules and regulations to navigate. Small wonder that most organizations tend to shy away from operating their own – and that many of the ones that do usually aren’t the best at it. But there’s been a trend growing in the data center industry for the past several years: the data-center-in-a-box. Operating out of a unit that looks more like a storage crate or shipping container, these solutions are easy to deploy, easy to spin down, and extremely portable – factors which make them ideal for […]

Continue reading

How Worried Should You Be About Dynamic IPs?

One of the oldest, most tried-and-true methods of defeating a DDoS attack is by blocking the IP addresses used to execute it. Unfortunately, criminals are acutely aware of that fact – and in response, they’ve begun launching their attacks through a completely different vector: Layer 7, the application layer. By using real IP addresses, they’re able to establish a three-way TCP handshake, bypassing both cookies and JavaScript. Worse still, many of these attacks have grown surprisingly complex, implementing human like browsing behaviors, patterns, and timing. This means that the larger the attacks are, the more difficult they are to detect.  And IP-based defense systems cannot effectively tell the difference between these attacks and legitimate visitors – meaning that if they’re […]

Continue reading

Tell Us Your Problems. We Have Solutions.