Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
November 29, 202310 de dezembro de 2024
Rebecca BezerraBlog

The Digital Future of SMEs: Why are managed cybersecurity services essential for business continuity? 

In recent decades, Small and Medium-sized Enterprises (SMEs) have become the engine of the global economy, driving innovation and growth. However, as these companies thrive in an ever-evolving digital environment, they also face challenges...
Read More
November 8th, 202310 de dezembro de 2024
Rebecca BezerraBlog

SIM Swap: understand how the scam works and how to protect yourself

By Caique Barqueta: SIM swapping poses a significant threat to organizations. Criminals can gain access to sensitive accounts and data by swapping phone SIM cards. Companies, especially telecommunications and process outsourcing companies, are prime targets. Security measures...
Read More
October 25th, 202310 de dezembro de 2024
Jaqueline SantosBlog

Clickjacking: one click can ruin everything

Brazil is in 2nd place in the ranking of countries most affected by cyber attacks in Latin America. And it leads the world in the rate of data leaks for the second year running, with more than 1 million Brazilians victims of...
Read More
October 20th, 202310 de dezembro de 2024
Rebecca BezerraBlog

IRoX Team threatens to attack Brazil. Learn how to protect your business

By ISH and SafeLabs: A group of cyber activists called 'IRoX Team' has announced a cyber war against Israel and its supporters, releasing dates for their cyber attacks. According to a post on a public messaging group, the group supports...
Read More
October 18th, 202310 de dezembro de 2024
Rebecca BezerraBlog

What is the life cycle of a ransomware attack like?

By Caique Barqueta: Our Threat Intelligence team, Heimdall, has analyzed and explained in detail the entire life cycle of a ransomware incident, exposing some details of the techniques used for initial access, persistence and lateral movement, as well as the impact...
Read More
October 4th, 202310 de dezembro de 2024
Rebecca BezerraBlog

The main threat groups targeting Brazil: meet Red Apollo

By Ismael Rocha: An advanced persistent threat (APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal information...
Read More
September 27th, 202310 de dezembro de 2024
Rebecca BezerraBlog

Hackers use messaging app for cybercrime

By Caique Barqueta: We can say that Telegram is a messaging application that is being used by many people around the world for various purposes, whether for legal or illegal activities. For illegal purposes, Telegram...
Read More
September 14th, 202310 de dezembro de 2024
Rebecca BezerraBlog

Deepfake Phishing: what to do when the fraudster assumes a trustworthy identity? 

Deepfakes, using advanced artificial intelligence techniques, are becoming a dangerous weapon in the hands of hackers. A recent study revealed that these ultra-realistic manipulations of videos, images and audio are increasingly being used to gain access...
Read More
August 30th, 202310 de dezembro de 2024
Rebecca BezerraBlog

Main threat groups targeting Brazil: meet APT41

By Ismael Rocha: An advanced persistent threat (APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal information...
Read More
August 23, 202310 de dezembro de 2024
Jaqueline SantosBlog

The power of Generative AI: Learn how technological advances are challenging cybersecurity 

In recent years, Generative Artificial Intelligence has emerged as a powerful tool for creating autonomous content, including images, videos and even text. Rapidly evolving, this technology presents a series of benefits and challenges for...
Read More
1 2 3 4 5 6 … 16

Latest posts

  • GenAI na multinuvem: como a inteligência artificial amplia riscos cibernéticos e exige defesas automatizadas 16 de julho de 2025
  • Do login à invasão: como a Porta 22 se tornou alvo global e o que fazer para evitar ataques 25 de junho de 2025
  • Aplicativos maliciosos: entenda os riscos e saiba como proteger seus dispositivos 4 de junho de 2025
  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025

Categories

Blog (217) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.