Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
April 13th, 2022December 10th, 2024
Jaqueline SantosBlog, Security

How much is your data worth? For hackers, millions of dollars

We'd like to start by asking you to imagine the volume of information circulating in your company. Histories of confidential negotiations with clients, financial files such as annual profits, strategic information on the direction of operations and a multitude of other data from...
Read More
April 5th, 2022December 10th, 2024
Jéssica TrucatBlog, Insider, Segurança, Technology

BlackCat Ransomware: the attack that has companies around the world worried

BlackCat, also known as ALPHV, is a Ransomware as a Service - RaaS that has been gaining notoriety since November 2021, has been in the spotlight and has caused major damage to several companies around the world. This ransomware is...
Read More
Hive Group
March 30th, 2022December 10th, 2024
Jéssica TrucatBlog, Insider, Segurança

The Hive Ransomware Group that stood out in 2021 is back; learn how to protect yourself

The Hive Group has already been the subject of our security reports, due to its prominence in the cyber world. We bring back the topic of this ransomware, which today has a high possibility of correlation with Nokoyawa due to the sharing...
Read More
March 8th, 2022December 10th, 2024
Jaqueline SantosBlog, Security

When your exposure on social media becomes a threat to your company

On social media, people let their guard down. They take advantage of their lunch break to check their feed, when work is over and even before bed, as a form of entertainment and relaxation. On Instagram, Twitter, Facebook and...
Read More
black friday phishing
November 26, 2021December 10th, 2024
Jaqueline SantosBlog, Security

Free iPhone offer? We've listed some of the classic Black Friday phishing lures

People look forward to Black Friday because it's a chance to buy expensive things at a much lower cost. And cybercriminals know this. That's why phishing attacks still work during this discount season. But...
Read More
Theft of an unlocked cell phone
August 23, 2021December 10th, 2024
Jaqueline SantosBlog, Security

To steal your money from the bank, criminals no longer need technology, just your unlocked cell phone

Criminals tend to follow the money. And in Brazil, this translates into types of robberies that, for a while, seem to become fashionable, as they remain in the headlines and newspapers on television for months, sometimes even years. It's easy...
Read More
August 9th, 2021December 10th, 2024
Jaqueline SantosBlog, Security

Leaked data from the Pegasus project shows the potential risk of malware for companies

Questions are being asked about the work of the NSO Group, a cyber-surveillance specialist based in Israel, following the exposure of more than 50,000 phone numbers belonging to activists, journalists and other people considered to be "of interest" to some of the...
Read More
July 15th, 2021December 10th, 2024
Jaqueline SantosBlog, Security

7 cybersecurity priorities that CISOs should focus on in 2021

In 2020, a world going digital was accelerated by COVID-19, requiring companies to enable remote workforces overnight, without planning or preparation. This change required chief information security officers (CISOs) to...
Read More
July 12, 2021December 10th, 2024
Jaqueline SantosBlog, Security

The key to protecting brands and companies lies in a new cybersecurity architecture

Warren Buffet, the American investor and philanthropist, said the following: "It takes years to build a reputation and seconds to destroy it." The expression certainly rings true in information security. Although Warren Buffet wasn't referring to information security,...
Read More
July 7th, 2021December 10th, 2024
Jaqueline SantosSecurity

DLL Hijacking - a simple technique that makes an attack more stealthy; understand it

Written by: Alexandre Siviero The recent REvil ransomware attack through Kaseya's infrastructure is the latest in a series of attacks that have incorporated a technique known as DLL Side-Loading. According to the MITRE ATT&CK framework, this is a...
Read More
1 2 3

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.