As companies are increasingly exposed to the risks of cyber attacks against their supply chains, it has become more important than ever to take protective measures. Since their suppliers...
By Ícaro César: In this report you will follow a Security Survey - Emulation and Detection, with the LLMNR (Link Local Multicast Name Resolution) and NBT-NS (NetBIOS Name Service) Technique, Spoofing and Poisoning, which are two very effective methods for...
Cyber-attacks are taking a lot of sleep away from managers around the world, as they can lead to immense financial losses for organizations. In this cybersecurity scenario, investing in information security is no longer a competitive differentiator for...
By Laura Cardillo and Átila Altoé: This is an analysis of a file transformed into VBS language, which is a phishing file received via e-mail by a third-party account. The focus of this report is not to explain in detail how it works...
Phishing and Ransomware attacks have become a major security concern for all types of companies, regardless of their size or segment. These attacks are sneaky, but have a major impact on business and are capable of...
The increase in scams using cryptocurrencies goes hand in hand with their value on the market. A cryptocurrency is an electronic currency that operates outside the control of governments and central banks, such as the Central Bank of Brazil....
By Alexandre Siviero - Emotet is a trojan spread predominantly through fraudulent emails (malspam). The infection can arrive via malicious script, macro-enabled document files or malicious links. Emails containing Emotet can contain familiar promotions designed to...
Cybersquatting is becoming a threat to any company. The number of cases registered as a result of business involving NFT technology is growing rapidly. And this is not surprising, as cybersquatting sites are effective launching pads...
By Alexandre Siviero (updated April 29) - This is an analysis of a Brazilian banking malware first spotted in 2017, called Ousaban, or Javali. There is an ongoing campaign spreading this malware with phishing...
Olá,Informamos sobre uma recente movimentação estratégica.A ISH Tecnologia passou por um processo de cisão, dando origem à Vision Cybersecurity. As empresas iniciam uma nova fase, com uma estrutura especializada para diferentes contextos de atuação em cibersegurança.
Public SectorSoluções para infraestrutura crítica, soberania digital e ambientes regulados, exclusivas para o setor público.Access
Empresas PrivadasInteligência, antecipação e proteção exclusivamente para empresas privadas e ambientes digitais críticos.Access