Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
Malicious Power Point
January 20th, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

From phishing to malware, we analyze all the stages of a fileless attack

By Alexandre Siviero The phishing alert that distributed a malicious Power Point was made by researchers Ankit Anubhav and Germán Fernández, who contacted the ISH team. These researchers attributed the threat to NjRAT, specifically...
Read More
Exchange servers
January 6th, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

The turn of the year was marked by e-mail problems on Exchange servers

By Alexandre Siviero, Atila Altoé and Laura Cardillo As soon as 2022 began, a problem in the component that scans attachments in emails on Exchange servers interrupted the messaging queues. One interesting point was the similarity of the programming flaw...
Read More
banking malware
December 30th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

Banking malware is common at this time of year and some good practices can prevent it

This time of year is the season for attacks and fraud involving Brazilian bank accounts. But there are good practices that can protect anyone from social engineering techniques and financial malware. In this post, you'll find guidelines on how not to...
Read More
Group involved in the SolarWinds case
October 27th, 2021December 10th, 2024
Jaqueline SantosInsider, Blog

Group involved in SolarWinds case makes new attacks on supply chain

Nobelium, the group involved in the SolarWinds case, is replicating tactics from previous supply chain attacks with new approaches. Such attacks have been taking place in the United States and Europe since May 2021....
Read More
Microsoft Exchange alert
April 19th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, On-the-go

Microsoft Exchange alert: users, check your environment for security breaches

By Paulo Trindade and Atila Abreu Altoe The Microsoft Exchange alert deals with vulnerabilities detected in the Exchange Server platform. Microsoft has released patches to address these vulnerabilities. But how do you know if breaches have occurred in your environment? In this alert, prepared by...
Read More
Phishing scam
March 25th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider

We've detected a phishing scam that has already stolen 1 million pieces of data; find out how to protect yourself

ISH Tecnologia's threat intelligence team has detected the leak of almost 1 million passwords collected in a spear phishing scam. The initial infection vector is a fake billing email from major mobile operators...
Read More
Costs of ransomware attack
March 11, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

This is one of the biggest costs in the event of a ransomware attack

Companies that are victims of a ransomware attack can take days, sometimes even weeks, to restore their systems after an event. And downtime can be very expensive. If services and operations are interrupted, there are many...
Read More
Drones are a threat to cyber security
December 3rd, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Offline, On-the-go

Are drones a threat to cyber security?

The number of drones registered in Brazil increased by 51% from 2018 to 2019, jumping from 18,389 to 27,665 in that period. The data comes from the National Civil Aviation Agency (Anac). The Brazilian market for unmanned aerial vehicles has been growing,...
Read More
Be careful what you ask your virtual assistant to do at home
November 26, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Offline, Reviews, Trends

Be careful what you ask your virtual assistant to do in your home

Warnings about the risks involved in smart speakers and the large number of virtual assistants available on the market today are not new. There have been cases in the past of invasion of privacy. But the issue that needs to be clarified...
Read More
Why managing privileged access prevents cyber attacks
November 20th, 2020December 10th, 2024
Jaqueline SantosBlog, Insights, Reviews, Trends

Why managing privileged access prevents cyber attacks

The consequences of a cyber attack are costly. According to Accenture's Ninth Annual Cost of Cybercrime Study, the average financial impact of an intrusion has risen from $1.4 million to $13 million per attack. E...
Read More
1 … 6 7 8 9 10

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.