Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
May 11, 2022December 10th, 2024
Jéssica TrucatBlog, Geral, On-the-go, Segurança, Trends

Crypto scams jeopardize the security of cryptocurrencies

The increase in scams using cryptocurrencies goes hand in hand with their value on the market. A cryptocurrency is an electronic currency that operates outside the control of governments and central banks, such as the Central Bank of Brazil....
Read More
emotet
May 9th, 2022December 10th, 2024
Jéssica TrucatBlog, Segurança

Learn about the new method of spreading Emotet malware and how to identify it

By Alexandre Siviero - Emotet is a trojan spread predominantly through fraudulent emails (malspam). The infection can arrive via malicious script, macro-enabled document files or malicious links. Emails containing Emotet can contain familiar promotions designed to...
Read More
invoice phishing
April 25th, 2022December 10th, 2024
Jaqueline SantosBlog, Insider, On-the-go, Trends

We analyze an Ousaban malware campaign phishing for electronic invoices and income tax.

By Alexandre Siviero (updated April 29) - This is an analysis of a Brazilian banking malware first spotted in 2017, called Ousaban, or Javali. There is an ongoing campaign spreading this malware with phishing...
Read More
April 20th, 2022December 10th, 2024
Jaqueline SantosBlog

Quick guide to Ransomware: data hijacking and why are companies at risk?

Quando se trata de segurança cibernética, empresas de todos os tamanhos e segmentos precisam lidar com um desafio comum: a abundância e gravidade dos ataques de ransomware. Cada vez mais usado por cibercriminosos, esse tipo de malware pode paralisar toda…
Read More
April 14th, 2022December 10th, 2024
Jessica TrucatBlog, Reviews, Security, Trends

Get to know the top threats affecting Brazil in the last month

Brazil is one of the countries that suffers the most cyber-attacks in the world - and this scenario has worsened considerably since the pandemic. Being aware of the threats on the rise in Brazil and around the world is becoming increasingly important and...
Read More
April 13th, 2022December 10th, 2024
Jaqueline SantosBlog, Security

How much is your data worth? For hackers, millions of dollars

We'd like to start by asking you to imagine the volume of information circulating in your company. Histories of confidential negotiations with clients, financial files such as annual profits, strategic information on the direction of operations and a multitude of other data from...
Read More
April 5th, 2022December 10th, 2024
Jéssica TrucatBlog, Insider, Segurança, Technology

BlackCat Ransomware: the attack that has companies around the world worried

BlackCat, also known as ALPHV, is a Ransomware as a Service - RaaS that has been gaining notoriety since November 2021, has been in the spotlight and has caused major damage to several companies around the world. This ransomware is...
Read More
ZERO-DAY
April 5th, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

Spring4Shell: new zero-day discovered

Spring-core is a framework widely used in Java applications that allows software developers to develop Java applications with enterprise-level components. A new vulnerability affecting this product has been identified and exploits and proofs of concept that...
Read More
Hive Group
March 30th, 2022December 10th, 2024
Jéssica TrucatBlog, Insider, Segurança

The Hive Ransomware Group that stood out in 2021 is back; learn how to protect yourself

The Hive Group has already been the subject of our security reports, due to its prominence in the cyber world. We bring back the topic of this ransomware, which today has a high possibility of correlation with Nokoyawa due to the sharing...
Read More
DLL HIJACKING
March 28, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

DLL Hijacking - injecting DLLs for evasion and persistence

There is a MITRE sub-technique for injecting DLLs, called DLL Hijacking. And in this post, you'll find a theoretical explanation and a simple proof of concept, with a DLL programmed in C++ that opens the Windows calculator...
Read More
1 … 9 10 11 12 13 … 17

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.