Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
We have detected a campaign that distributes malware via Excel spreadsheets
November 17th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Trends

We have detected a campaign that distributes malware via Excel spreadsheets; the focus of the fraud is companies

We have detected a campaign that distributes malware via Excel spreadsheets

Read More
Group involved in the SolarWinds case
October 27th, 2021December 10th, 2024
Jaqueline SantosInsider, Blog

Group involved in SolarWinds case makes new attacks on supply chain

Nobelium, the group involved in the SolarWinds case, is replicating tactics from previous supply chain attacks with new approaches. Such attacks have been taking place in the United States and Europe since May 2021....
Read More
The 7 main risks of identity management and network access
October 4th, 2021December 10th, 2024
Jaqueline SantosBlog

The 7 main risks of identity management and network access

By evaluating identity and network access management, companies gain benefits that far outweigh any disadvantages. However, organizations must consider some of the risks of identity and network access management when...
Read More
Ransomware as a service (RaaS): when malware becomes a business model
October 4th, 2021December 10th, 2024
Jaqueline SantosBlog

Ransomware as a service (RaaS): when malware becomes a business model

Ransomware is not a new threat to the cyber world. Its origins go back many years. Over time, this threat has become even more vicious and damaging. As people tried to deal with this cyber threat, cyber criminals...
Read More
September 8th, 2021December 10th, 2024
Jaqueline SantosBlog, General

The ransomware threat continues to evolve, defense needs to keep pace

The news about cyber attacks and data theft is daily. They illustrate the serious damage caused by ransomware attacks and the urgency needed to mature organizations' defenses. In July, the Fleury diagnostic medicine group suffered a...
Read More
Theft of an unlocked cell phone
August 23, 2021December 10th, 2024
Jaqueline SantosBlog, Security

To steal your money from the bank, criminals no longer need technology, just your unlocked cell phone

Criminals tend to follow the money. And in Brazil, this translates into types of robberies that, for a while, seem to become fashionable, as they remain in the headlines and newspapers on television for months, sometimes even years. It's easy...
Read More
RansomExx
August 20th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider

RansomExx - the ransomware behind the attacks on Brazilian brands

Ataques de ransomware contra lojas e empresas brasileiras nos últimos dias repercutem em todo o país pelo seu poder destrutivo. O uso do RansomExx vem chamando a atenção. Com uma evolução do malware para afetar não somente sistemas Windows, mas…
Read More
August 19th, 2021December 10th, 2024
Jaqueline SantosBlog, General

ISG Provider Lens™ positions ISH Tecnologia as leader in 3 categories in cybersecurity market study

ISH Tecnologia was elected market leader for the second year running, this time in 3 quadrants, by the ISG Provider Lens™ Cybersecurity 2021 - Solutions & Services for Brazil report. The study evaluated the strengths and competitive differentials...
Read More
August 19th, 2021December 10th, 2024
Jaqueline SantosBlog, General

Average cost of ransomware triples and threatens companies in all market segments

One of the main reasons why ransomware keeps growing is simple: because it works. All a criminal needs to break into a corporate network and carry out an attack is for a user to have a weak password,...
Read More
August 9th, 2021December 10th, 2024
Jaqueline SantosBlog, Security

Leaked data from the Pegasus project shows the potential risk of malware for companies

Questions are being asked about the work of the NSO Group, a cyber-surveillance specialist based in Israel, following the exposure of more than 50,000 phone numbers belonging to activists, journalists and other people considered to be "of interest" to some of the...
Read More
1 … 15 16 17 18 19 … 24

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.