Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
April 20th, 2022December 10th, 2024
Jaqueline SantosBlog

Quick guide to Ransomware: data hijacking and why are companies at risk?

Quando se trata de segurança cibernética, empresas de todos os tamanhos e segmentos precisam lidar com um desafio comum: a abundância e gravidade dos ataques de ransomware. Cada vez mais usado por cibercriminosos, esse tipo de malware pode paralisar toda…
Read More
April 14th, 2022December 10th, 2024
Jessica TrucatBlog, Reviews, Security, Trends

Get to know the top threats affecting Brazil in the last month

Brazil is one of the countries that suffers the most cyber-attacks in the world - and this scenario has worsened considerably since the pandemic. Being aware of the threats on the rise in Brazil and around the world is becoming increasingly important and...
Read More
April 13th, 2022December 10th, 2024
Jaqueline SantosBlog, Security

How much is your data worth? For hackers, millions of dollars

We'd like to start by asking you to imagine the volume of information circulating in your company. Histories of confidential negotiations with clients, financial files such as annual profits, strategic information on the direction of operations and a multitude of other data from...
Read More
April 5th, 2022December 10th, 2024
Jéssica TrucatBlog, Insider, Segurança, Technology

BlackCat Ransomware: the attack that has companies around the world worried

BlackCat, also known as ALPHV, is a Ransomware as a Service - RaaS that has been gaining notoriety since November 2021, has been in the spotlight and has caused major damage to several companies around the world. This ransomware is...
Read More
ZERO-DAY
April 5th, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

Spring4Shell: new zero-day discovered

Spring-core is a framework widely used in Java applications that allows software developers to develop Java applications with enterprise-level components. A new vulnerability affecting this product has been identified and exploits and proofs of concept that...
Read More
Hive Group
March 30th, 2022December 10th, 2024
Jéssica TrucatBlog, Insider, Segurança

The Hive Ransomware Group that stood out in 2021 is back; learn how to protect yourself

The Hive Group has already been the subject of our security reports, due to its prominence in the cyber world. We bring back the topic of this ransomware, which today has a high possibility of correlation with Nokoyawa due to the sharing...
Read More
DLL HIJACKING
March 28, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

DLL Hijacking - injecting DLLs for evasion and persistence

There is a MITRE sub-technique for injecting DLLs, called DLL Hijacking. And in this post, you'll find a theoretical explanation and a simple proof of concept, with a DLL programmed in C++ that opens the Windows calculator...
Read More
Rússia e Ucrânia
24 de março de 2022December 10th, 2024
Jaqueline SantosBlog

Como a guerra cibernética muda o conflito entre Rússia e Ucrânia

O conflito entre Rússia e Ucrânia levanta uma questão importante de cibersegurança. Há um mês a Ucrânia vem sendo atacada pela Rússia, sem nenhuma previsão de cessar fogo ou de propor acordo entre as partes. Enquanto isso, diversos países vêm…
Read More
March 23, 202228 de fevereiro de 2026
Jaqueline SantosBlog, Insights

Are we facing an outbreak of cyber attacks?

The war scenario in Ukraine and the lightning cyber attacks on various organizations around the world have consolidated the need to implement a cyber resilience structure to reduce risks and allow companies to continue their digital transformation....
Read More
AES encryption in malware analysis
March 11, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

How to deal with AES encryption in malware analysis

In malware research, there are basically two types of analysis: static and dynamic. Simply put, static analysis comprises all the ways of studying software without running it, while its dynamic counterpart is based on observing the program during...
Read More
1 … 13 14 15 16 17 … 24

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.