Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
16 de julho de 202516 de julho de 2025
Nathalia ZagoBlog

GenAI na multinuvem: como a inteligência artificial amplia riscos cibernéticos e exige defesas automatizadas

Enquanto o mercado se deslumbra com o poder da IA generativa, que vem dominando as iniciativas corporativas, os líderes de cibersegurança enfrentam um cenário complexo de novas ameaças digitais.    Uma pesquisa revela que 68% dos CISOs brasileiros apontam que…
Read More
25 de junho de 2025
Rebecca BezerraBlog

Do login à invasão: como a Porta 22 se tornou alvo global e o que fazer para evitar ataques

Por Ismael Rocha e Thiago Cesar: A Porta 22 pode ser o elo mais frágil da sua infraestrutura digital. O protocolo SSH (Secure Shell) é essencial para o acesso remoto seguro a servidores e dispositivos em rede. No entanto, quando…
Read More
17 de dezembro de 202417 de dezembro de 2024
Rebecca BezerraBlog

Ransomware BianLian: entenda as táticas e impactos do grupo, e saiba como se proteger

Por Ismael Rocha: O cenário de Ransomware mantém-se ativo em 2024, com diversos grupos de ransomware realizando ataques a uma ampla gama de organizações. Nesse contexto, temos o BianLian Ransomware, uma ameaça cibernética que tem se destacado por suas operações…
Read More
May 8th, 202410 de dezembro de 2024
Rebecca BezerraBlog

Cactus ransomware uses malware and VPN attacks to infiltrate companies around the world: learn how to protect yourself

By Heimdall: Cactus ransomware is a sophisticated form of malware that infiltrates organizations' systems, encrypting vital data and demanding substantial ransoms for its release. Its spread has been rapid and effective, exploiting vulnerabilities in corporate networks...
Read More
January 3rd, 202410 de dezembro de 2024
Rebecca BezerraBlog

The importance of Cyber Threat Intelligence for companies

By Heimdall: The evolution of cyber threats reflects the constant adaptation and sophistication of tactics used by cybercriminals. In the early days of the internet, threats were relatively simple and often limited to viruses and worms that spread via...
Read More
October 4th, 202310 de dezembro de 2024
Rebecca BezerraBlog

The main threat groups targeting Brazil: meet Red Apollo

By Ismael Rocha: An advanced persistent threat (APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal information...
Read More
August 30th, 202310 de dezembro de 2024
Rebecca BezerraBlog

Main threat groups targeting Brazil: meet APT41

By Ismael Rocha: An advanced persistent threat (APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal information...
Read More
August 2nd, 202310 de dezembro de 2024
Rebecca BezerraBlog

The main threat groups targeting Brazil: meet the Lazarus Group

By Ismael Rocha: An advanced persistent threat (APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal information...
Read More
July 5th, 202310 de dezembro de 2024
Rebecca BezerraBlog

8base ransomware: hackers have increased double extortion attacks in recent months and use encryption to leak data

By Caique Barqueta: The 8base ransomware group first came to prominence in early March 2022, remaining relatively quiet after only a few attacks. They operate like other ransomware groups, through double extortion (encryption +...
Read More
June 28, 202310 de dezembro de 2024
Rebecca BezerraBlog

The danger is in your inbox: exponential increase in phishing puts companies on alert 

The increase in phishing on email and collaboration platforms has been a worrying trend in recent years, according to the State of Email Security report. According to the survey of 1,700 IT professionals, the most significant threats...
Read More
1 2 3 ... 5

Latest posts

  • GenAI na multinuvem: como a inteligência artificial amplia riscos cibernéticos e exige defesas automatizadas 16 de julho de 2025
  • Do login à invasão: como a Porta 22 se tornou alvo global e o que fazer para evitar ataques 25 de junho de 2025
  • Aplicativos maliciosos: entenda os riscos e saiba como proteger seus dispositivos 4 de junho de 2025
  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025

Categories

Blog (217) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.