Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
March 22nd, 2024December 10th, 2024
Rebecca BezerraBlog

Snatch: ransomware encrypts files and manages to avoid detection by antivirus. Find out more about its operation

By Heimdall: The Snatch Ransomware, in its operations, has affected various types of organizations, from the most varied segments. The group has apparently been active for approximately 5 years since it was first identified, adopting specific characteristics in its attacks, such as the use...
Read More
March 6th, 202425 de outubro de 2024
Jaqueline SantosBlog

Cybersecurity and artificial intelligence: Understanding the complex relationship between this combination

The rise of Artificial Intelligence (AI) has been one of the most revolutionary and disruptive phenomena of the 21st century. Its advances have crossed many sectors, transforming everything from the way we consume content to how companies protect their data. However,...
Read More
February 28, 2024December 10th, 2024
Rebecca BezerraBlog

Ransomware .infected: learn details about the operation of the MedusaLocker ransomware variant

By Heimdall and ISH DFIR: A ransomware variant of the MedusaLocker family, known as ".infected", identified in mid-September 2019, continues to operate and affect several organizations around the world. This ransomware works by encrypting...
Read More
February 20th, 2024December 10th, 2024
Rebecca BezerraBlog

How to shield essential services from cyber threats

Cyber security has become a major concern, especially for critical infrastructures such as those in areas like education, health and banking. These sectors are vital to the functioning of society and are therefore attractive targets for cyberattacks. Protecting these...
Read More
February 1st, 2024February 1st, 2024
Jaqueline SantosBlog

Cybersecurity Mesh: more efficient risk management 

While technological advances bring innovation and convenience, they also open the door to constantly evolving cyber threats. In today's information security landscape, the need to adapt and innovate has never been more imperative. According to a recent survey...
Read More
January 24, 2024December 10th, 2024
Rebecca BezerraBlog

ISH announces new CEOs: learn more about the company's history and the strategy of the visionaries leading the future of cybersecurity 

The year was 1996. After many years of hyperinflation, Brazil was experiencing a more predictable economic period, with the stabilization provided by the Real Plan launched two years earlier. In terms of technology, the internet was advancing slowly and with a certain...
Read More
January 17th, 2024December 10th, 2024
Rebecca BezerraBlog

Cybercriminals use Stealer-type malware to steal cookies

By Heimdall: With various digital threats emerging every day, cybercriminals are undoubtedly betting on using stealer-type malware (focused on stealing information) to make a profit from the stolen data. As an example, we can mention the malware...
Read More
January 10th, 2024January 10th, 2024
Jaqueline SantosBlog

IT Governance and IS Governance: An essential integration between Compliance and Innovation 

With constantly evolving threats and increasing regulatory pressure, companies face a complex scenario: on the one hand, the challenges of guaranteeing data integrity and, on the other, the need to innovate and adapt quickly. According to recent research,...
Read More
January 3rd, 2024December 10th, 2024
Rebecca BezerraBlog

The importance of Cyber Threat Intelligence for companies

By Heimdall: The evolution of cyber threats reflects the constant adaptation and sophistication of tactics used by cybercriminals. In the early days of the internet, threats were relatively simple and often limited to viruses and worms that spread via...
Read More
December 13th, 2023December 13th, 2023
Jaqueline SantosBlog

Beware of fraud! Why is Brazil one of the main targets for online shopping scams? 

E-commerce in Brazil has grown exponentially in recent years, with a significant leap in the volume of transactions. At the same time, online fraud has also become more sophisticated. A scenario that reflects not only the expansion of digital activity, but...
Read More
1 … 4 5 6 7 8 … 24

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.

Novidades sobre a nossa estrutura de negócios

Olá, Informamos sobre uma recente movimentação estratégica. A ISH Tecnologia passou por um processo de cisão, dando origem à Vision Cybersecurity. As empresas iniciam uma nova fase, com uma estrutura especializada para diferentes contextos de atuação em cibersegurança.
ISH Public Sector Soluções para infraestrutura crítica, soberania digital e ambientes regulados, exclusivas para o setor público. Access
Vision Empresas Privadas Inteligência, antecipação e proteção exclusivamente para empresas privadas e ambientes digitais críticos. Access