Blog

Is your ISP keeping up with evolving DDoS threats?

Iain Westwood

How DDoS attacks have evolved

As with most IT security threats, distributed denial of service attacks have evolved over time.  Simple attacks at the network level designed to exhaust target bandwidth capacity have been complemented with more complex and subtle attacks that can bring down websites but leave the network standing, often without triggering DDoS mitigation.

more →

Blog

Join Us For The activereach Fantasy Premier League 19/20

After a great 18/19 season, our most successful to date, activereach will be hosting another custom Fantasy Premier League. It is completely free to take part and activereach will donate £250 to the charity of the winner’s choice at the end of the season.

If you already take part in the official Fantasy Premier League game then you know the drill.

more →

Blog

CrowdStrike’s Adam Meyers on eCrime Actors’ Pivot to Ransomware

Sharon Holland

A recent article on Dark Reading by VP of Intelligence Adam Meyers at our partner Crowdstrike is titled “The Big E-Crime Pivot.” It puts forth the argument that cybercriminals “have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.”

For those that don’t have time to read the full article, we have collated some of the highlights:

What is the Pivot?

more →

Blog

Protecting Energy and Utility Companies from DDoS Attacks

Lorna Fimia

Protecting UK energy and utility companies from cyber and distributed denial of service (DDoS) attacks is a top priority for the government. Organizations responsible for critical national infrastructure have become a prime target for denial-of-service events; a DDoS attack is designed to overwhelm networks with bogus traffic and has the potential to cause massive utility outages and service disruption.

more →

Blog

Top 6 Risks to the Enterprise from The Internet of Things (IoT)

Sharon Holland

IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network.  The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025.  Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.

more →