Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
9 de dezembro de 20259 de dezembro de 2025
Rebecca BezerraBlog

Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio

Por Ismael Rocha: O recurso de compartilhamento de tela do WhatsApp, pensado para facilitar suporte remoto e interações cotidianas, vem sendo explorado por criminosos em um golpe que está se espalhando rapidamente. A fraude, baseada inteiramente em engenharia social, permite…
Read More
July 16, 2025July 16, 2025
Nathalia ZagoBlog

GenAI in the multi-cloud: how artificial intelligence increases cyber risks and requires automated defenses

While the market is dazzled by the power of generative AI, which is dominating corporate initiatives, cybersecurity leaders face a complex scenario of new digital threats. A survey reveals that 68% of Brazilian CISOs point out that...
Read More
June 25th, 2025
Rebecca BezerraBlog

From login to invasion: how Port 22 became a global target and what to do to prevent attacks

By Ismael Rocha and Thiago Cesar: Port 22 may be the weakest link in your digital infrastructure. The SSH (Secure Shell) protocol is essential for secure remote access to servers and networked devices. However, when...
Read More
May 6th, 2025May 6th, 2025
Nathalia ZagoBlog

What a VPN really protects - and why it's not enough for your digital security

With the growth of remote and hybrid working, corporate VPNs have become one of the main tools for guaranteeing secure remote access to companies' internal systems. A report shows that 93% of organizations around the world use VPNs...
Read More
April 8th, 2025
Nathalia ZagoBlog

End-to-end encryption: how does it work and how does it protect your data?

Every day, messages, files and personal information circulate on the internet all the time, making data protection a growing challenge. So how do you ensure that only you and the recipient can access this information, without interference from third parties?...
Read More
March 26, 2025
Rebecca BezerraBlog

Lynx ransomware: learn details of the operation and how to mitigate this threat

By Ícaro Cesar and Ismael Rocha: The growing sophistication of cyber attacks requires companies to always be one step ahead in protecting their data. Lynx Ransomware stands out as one of today's most advanced threats, exploiting...
Read More
17 de dezembro de 202417 de dezembro de 2024
Rebecca BezerraBlog

Ransomware BianLian: entenda as táticas e impactos do grupo, e saiba como se proteger

Por Ismael Rocha: O cenário de Ransomware mantém-se ativo em 2024, com diversos grupos de ransomware realizando ataques a uma ampla gama de organizações. Nesse contexto, temos o BianLian Ransomware, uma ameaça cibernética que tem se destacado por suas operações…
Read More
August 29, 2024December 10th, 2024
Rebecca BezerraBlog

Smart sensors, global defense: check out the main threats and offenders identified by ISH

By Heimdall ISH: In today's article, we will highlight the key statistics collected by the ISH Intelligence team, Heimdall, which operates a vast network of sensors spread across several countries. These sensors have the capacity to collect, process...
Read More
July 3rd, 2024December 10th, 2024
Rebecca BezerraBlog

Security insights: June's main attack indicators

By Caique Barqueta: As a way of spreading cybersecurity and keeping the entire technology community in Brazil informed of the main developments, in this article we present the main data collected on potentially targeted attacks on existing ISH collectors...
Read More
May 22nd, 202430 de outubro de 2024
Rebecca BezerraBlog

Latin America in the crosshairs of cybercrime: increase in ransomware attacks worries organizations

By Ismael Rocha: In recent months, we have seen a significant drop in the activity of some of the most notorious ransomware groups. Several operations by international authorities have resulted in arrests and the dismantling of these criminals' infrastructures, impacting their ability to operate....
Read More
1 2 3 … 10

Latest posts

  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025
  • 5 anos de Pix: avanço das fraudes, novas regulações do Banco Central e os aprendizados de cibersegurança para o setor financeiro 19 de novembro de 2025

Categories

Blog (230) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.