Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
banking malware
December 30th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

Banking malware is common at this time of year and some good practices can prevent it

This time of year is the season for attacks and fraud involving Brazilian bank accounts. But there are good practices that can protect anyone from social engineering techniques and financial malware. In this post, you'll find guidelines on how not to...
Read More
Zero Day Vulnerability
December 13th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

There are still no patches for this Zero Day vulnerability in Windows; here's what to do

By Heimdall ISH A new Zero Day vulnerability (still unpatched) was presented to the security world on November 22nd. Mistakenly classified in the news as a bypass of CVE-2021-41379, this is actually a new variant discovered...
Read More
We have detected a campaign that distributes malware via Excel spreadsheets
November 17th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Trends

We have detected a campaign that distributes malware via Excel spreadsheets; the focus of the fraud is companies

We have detected a campaign that distributes malware via Excel spreadsheets

Read More
Group involved in the SolarWinds case
October 27th, 2021December 10th, 2024
Jaqueline SantosInsider, Blog

Group involved in SolarWinds case makes new attacks on supply chain

Nobelium, the group involved in the SolarWinds case, is replicating tactics from previous supply chain attacks with new approaches. Such attacks have been taking place in the United States and Europe since May 2021....
Read More
Colonial Pipeline case
May 19th, 2021December 10th, 2024
Jaqueline SantosBlog, General, Insider, Trends

The Colonial Pipeline case shows that ransomware is more sophisticated; so is protecting yourself from it

When a giant like Colonial Pipeline, the largest oil pipeline operator in the United States, falls victim to ransomware with such catastrophic results, even triggering a crisis in the fuel market, the warning goes out to all other companies, from...
Read More
false sense of security
April 29, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, On-the-go, Trends

The false sense of security - the greatest vulnerability

The ability of companies to adapt is as crucial to a business as their ability to generate profit. To do this, organizations depend on prepared leaders, who visualize and calculate actions considering the worst-case scenarios, from the loss of key...
Read More
Data security
February 24, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Trends

Data leaks represent a major security challenge today. Why?

In a reality where there is a veritable explosion of corporate information, companies need to have a thorough understanding of the risks they run and the data security this requires. Today, data are digital treasures coveted by spies...
Read More
The key to security is threat response time
January 5th, 2021December 10th, 2024
Jaqueline SantosBlog, Trends

The key to containing attacks is the speed of the response time to threats

The impact of a cyber attack is measured by how long an attacker remains in a company's systems unnoticed. The longer inside an environment, the more access to critical systems. Therefore, the key to containing attacks...
Read More
Drones are a threat to cyber security
December 3rd, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Offline, On-the-go

Are drones a threat to cyber security?

The number of drones registered in Brazil increased by 51% from 2018 to 2019, jumping from 18,389 to 27,665 in that period. The data comes from the National Civil Aviation Agency (Anac). The Brazilian market for unmanned aerial vehicles has been growing,...
Read More
Be careful what you ask your virtual assistant to do at home
November 26, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Offline, Reviews, Trends

Be careful what you ask your virtual assistant to do in your home

Warnings about the risks involved in smart speakers and the large number of virtual assistants available on the market today are not new. There have been cases in the past of invasion of privacy. But the issue that needs to be clarified...
Read More
1 2 3 4 5 6

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.