Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
13 de setembro de 202410 de dezembro de 2024
Rebecca BezerraBlog

Vision Assessments: por que avaliar a maturidade em cibersegurança da sua empresa?

A cada dia, novas ameaças cibernéticas surgem, colocando em risco a integridade dos negócios podendo comprometer a confiança dos clientes, a reputação da marca e os resultados financeiros. Como a sua empresa pode se assegurar de que está preparada para…
Read More
August 29, 202410 de dezembro de 2024
Rebecca BezerraBlog

Smart sensors, global defense: check out the main threats and offenders identified by ISH

By Heimdall ISH: In today's article, we will highlight the key statistics collected by the ISH Intelligence team, Heimdall, which operates a vast network of sensors spread across several countries. These sensors have the capacity to collect, process...
Read More
July 3rd, 202410 de dezembro de 2024
Rebecca BezerraBlog

Security insights: June's main attack indicators

By Caique Barqueta: As a way of spreading cybersecurity and keeping the entire technology community in Brazil informed of the main developments, in this article we present the main data collected on potentially targeted attacks on existing ISH collectors...
Read More
May 22nd, 202430 de outubro de 2024
Rebecca BezerraBlog

Latin America in the crosshairs of cybercrime: increase in ransomware attacks worries organizations

By Ismael Rocha: In recent months, we have seen a significant drop in the activity of some of the most notorious ransomware groups. Several operations by international authorities have resulted in arrests and the dismantling of these criminals' infrastructures, impacting their ability to operate....
Read More
May 8th, 202410 de dezembro de 2024
Rebecca BezerraBlog

Cactus ransomware uses malware and VPN attacks to infiltrate companies around the world: learn how to protect yourself

By Heimdall: Cactus ransomware is a sophisticated form of malware that infiltrates organizations' systems, encrypting vital data and demanding substantial ransoms for its release. Its spread has been rapid and effective, exploiting vulnerabilities in corporate networks...
Read More
April 3rd, 202410 de dezembro de 2024
Rebecca BezerraBlog

CloAk ransomware encrypts data and operates with other groups to pressure ransom payments

By Heimdall: The CloAk Ransomware, which emerged between late 2022 and early 2023, represents a relatively new group of ransomware that has stood out mainly for its activities in Europe, with a special focus on Germany. This malware...
Read More
March 27th, 202430 de outubro de 2024
Jaqueline SantosBlog

How PESI turns information security into a strategic advantage 

In the modern corporate world, where online transactions have become the heart of business operations, digitalization is not just a trend, but a consolidated reality. According to a study by the National Confederation of Industry (CNI), 70% of...
Read More
March 22nd, 202410 de dezembro de 2024
Rebecca BezerraBlog

Snatch: ransomware encrypts files and manages to avoid detection by antivirus. Find out more about its operation

By Heimdall: The Snatch Ransomware, in its operations, has affected various types of organizations, from the most varied segments. The group has apparently been active for approximately 5 years since it was first identified, adopting specific characteristics in its attacks, such as the use...
Read More
March 6th, 202425 de outubro de 2024
Jaqueline SantosBlog

Cybersecurity and artificial intelligence: Understanding the complex relationship between this combination

The rise of Artificial Intelligence (AI) has been one of the most revolutionary and disruptive phenomena of the 21st century. Its advances have crossed many sectors, transforming everything from the way we consume content to how companies protect their data. However,...
Read More
February 28, 202410 de dezembro de 2024
Rebecca BezerraBlog

Ransomware .infected: learn details about the operation of the MedusaLocker ransomware variant

By Heimdall and ISH DFIR: A ransomware variant of the MedusaLocker family, known as ".infected", identified in mid-September 2019, continues to operate and affect several organizations around the world. This ransomware works by encrypting...
Read More
1 2 3 4 … 16

Latest posts

  • Aplicativos maliciosos: entenda os riscos e saiba como proteger seus dispositivos 4 de junho de 2025
  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025
  • O que uma VPN realmente protege — e por que ela não basta para sua segurança digital 6 de maio de 2025
  • Como o ransomware Akira usa dupla extorsão, RaaS e táticas psicológicas — e como se defender 15 de abril de 2025

Categories

Blog (215) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.