Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
group that attacked the Colonial Pipeline
May 24, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, On-the-go, Trends

We explain how the group that attacked Colonial Pipeline operates; 13% of the victims were Brazilian companies

In recent days, the whole world has heard about the group that attacked Colonial Pipeline, called the DarkSide Ransomware Group. The attacks on large companies amounted to around U$90 million in Bitcoin. There have been at least 47 companies in the last 9...
Read More
Colonial Pipeline case
May 19th, 2021December 10th, 2024
Jaqueline SantosBlog, General, Insider, Trends

The Colonial Pipeline case shows that ransomware is more sophisticated; so is protecting yourself from it

When a giant like Colonial Pipeline, the largest oil pipeline operator in the United States, falls victim to ransomware with such catastrophic results, even triggering a crisis in the fuel market, the warning goes out to all other companies, from...
Read More
false sense of security
April 29, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, On-the-go, Trends

The false sense of security - the greatest vulnerability

The ability of companies to adapt is as crucial to a business as their ability to generate profit. To do this, organizations depend on prepared leaders, who visualize and calculate actions considering the worst-case scenarios, from the loss of key...
Read More
Microsoft Exchange alert
April 19th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, On-the-go

Microsoft Exchange alert: users, check your environment for security breaches

By Paulo Trindade and Atila Abreu Altoe The Microsoft Exchange alert deals with vulnerabilities detected in the Exchange Server platform. Microsoft has released patches to address these vulnerabilities. But how do you know if breaches have occurred in your environment? In this alert, prepared by...
Read More
ongoing phishing campaign using Trickbot
April 8th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

We have identified a scam using Trickbot and here are our recommendations

ISH's threat intelligence team has detected an ongoing phishing campaign using Trickbot, a sophisticated Trojan first identified in 2016 and constantly updated. Trickbot is used to steal information from...
Read More
Phishing scam
March 25th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider

We've detected a phishing scam that has already stolen 1 million pieces of data; find out how to protect yourself

ISH Tecnologia's threat intelligence team has detected the leak of almost 1 million passwords collected in a spear phishing scam. The initial infection vector is a fake billing email from major mobile operators...
Read More
Costs of ransomware attack
March 11, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

This is one of the biggest costs in the event of a ransomware attack

Companies that are victims of a ransomware attack can take days, sometimes even weeks, to restore their systems after an event. And downtime can be very expensive. If services and operations are interrupted, there are many...
Read More
Cost of a data breach
March 3rd, 2021December 10th, 2024
Jaqueline SantosBlog, General, Insider, Trends

What is the cost of a data breach?

Hackers broke into the computer system of Norsk Hydro, a global aluminum producer, in 2019. Once they got a foothold in the company's environment, the criminals spent weeks exploring the IT systems looking for more vulnerabilities. When they finally...
Read More
Data security
February 24, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Trends

Data leaks represent a major security challenge today. Why?

In a reality where there is a veritable explosion of corporate information, companies need to have a thorough understanding of the risks they run and the data security this requires. Today, data are digital treasures coveted by spies...
Read More
January 15th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Offline, Trends

The pandemic has changed digital security priorities

In the migration to the home office, life merged with work once and for all and personal devices became widely used for work. Videoconferencing tools have become the main environment for meetings, both for...
Read More
1 2 3 4 5

Latest posts

  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025
  • 5 anos de Pix: avanço das fraudes, novas regulações do Banco Central e os aprendizados de cibersegurança para o setor financeiro 19 de novembro de 2025

Categories

Blog (230) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.