Blog

How does activereach address Gartner’s key cyber predictions for 2022/23?

The ability to manage cyber risk is key and with regulations on the response to ransomware likely to affect a third of the world within the next 3 years tech analyst Gartner say business leaders should build the following predictions into their security strategies for the next two years. Read how activereach can assist you with you security strategy.

more →

Blog

The Rise of Double Ransomware Extortion and How to Protect Against It

Data extortion is not a new tactic for threat actors. Big Game Hunting (BGH) is where actors steal and leak data to force ransom payments.  However, if this threat does not work and the victim does not pay this can result in an additional threat of releasing the data to someone else, usually a competitor – double ransomware extortion.

more →

Blog

XSS, SQL injection, and WAF

John Baldock

XSS – Cross-site scripting

XSS is a common form of injection attack on public facing web servers. Any web server can be vulnerable to attack, and websites now are feature-rich with multiple embedded databases, comments sections, and media… all of which increase the vector types that can be attempted by cyber criminals for various reasons.

more →

Blog

NCSC Guidance On Preparing For A Denial Of Service Attack

Alastair Horner

Distributed Denial of Service or DDoS is an attack where there is an attempt to render an online service unavailable by overwhelming it with traffic from multiple distributed sources.

The National Cyber Security Centre (NCSC) is a pivotal organization in cyber security advice and supports the most critical organizations in the UK, the wider public sector, industry, SMEs and the general public.

more →