Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
October 20th, 2023December 10th, 2024
Rebecca BezerraBlog

IRoX Team threatens to attack Brazil. Learn how to protect your business

By ISH and SafeLabs: A group of cyber activists called 'IRoX Team' has announced a cyber war against Israel and its supporters, releasing dates for their cyber attacks. According to a post on a public messaging group, the group supports...
Read More
October 18th, 2023December 10th, 2024
Rebecca BezerraBlog

What is the life cycle of a ransomware attack like?

By Caique Barqueta: Our Threat Intelligence team, Heimdall, has analyzed and explained in detail the entire life cycle of a ransomware incident, exposing some details of the techniques used for initial access, persistence and lateral movement, as well as the impact...
Read More
September 27th, 2023December 10th, 2024
Rebecca BezerraBlog

Hackers use messaging app for cybercrime

By Caique Barqueta: We can say that Telegram is a messaging application that is being used by many people around the world for various purposes, whether for legal or illegal activities. For illegal purposes, Telegram...
Read More
September 14th, 2023December 10th, 2024
Rebecca BezerraBlog

Deepfake Phishing: what to do when the fraudster assumes a trustworthy identity? 

Deepfakes, using advanced artificial intelligence techniques, are becoming a dangerous weapon in the hands of hackers. A recent study revealed that these ultra-realistic manipulations of videos, images and audio are increasingly being used to gain access...
Read More
August 23, 2023December 10th, 2024
Jaqueline SantosBlog

The power of Generative AI: Learn how technological advances are challenging cybersecurity 

In recent years, Generative Artificial Intelligence has emerged as a powerful tool for creating autonomous content, including images, videos and even text. Rapidly evolving, this technology presents a series of benefits and challenges for...
Read More
July 19th, 2023December 10th, 2024
Rebecca BezerraBlog

The importance of digital forensics in cyber incidents

By Heimdall and ISH DFIR: As cyber incidents occur in organizations, it is essential to adopt good practices for incident response, in order to collect as much evidence as possible to assist in the investigation. To...
Read More
July 5th, 2023December 10th, 2024
Rebecca BezerraBlog

8base ransomware: hackers have increased double extortion attacks in recent months and use encryption to leak data

By Caique Barqueta: The 8base ransomware group first came to prominence in early March 2022, remaining relatively quiet after only a few attacks. They operate like other ransomware groups, through double extortion (encryption +...
Read More
June 28, 2023December 10th, 2024
Rebecca BezerraBlog

The danger is in your inbox: exponential increase in phishing puts companies on alert 

The increase in phishing on email and collaboration platforms has been a worrying trend in recent years, according to the State of Email Security report. According to the survey of 1,700 IT professionals, the most significant threats...
Read More
June 21st, 2023December 10th, 2024
Rebecca BezerraBlog

Cyber attacks and data theft: here's how to protect your company

By Caique Barqueta: Ransomware attacks have become increasingly sophisticated. Cybercriminals are employing other extortion tactics, such as stealing information before encryption is carried out, acting as a "double extortion", since the actors demand...
Read More
May 31, 2023December 10th, 2024
Rebecca BezerraBlog

Phishing campaigns continue to grow in Brazil. See the risks of credential leaks

By Ismael Rocha: Phishing attacks are one of the most common and damaging threats to digital security. They involve the use of fraudulent emails, fake websites and other deceptive techniques to obtain confidential information, such as passwords, numbers...
Read More
1 2 3 4 5 … 10

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.