Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
July 3rd, 202410 de dezembro de 2024
Rebecca BezerraBlog

Security insights: June's main attack indicators

By Caique Barqueta: As a way of spreading cybersecurity and keeping the entire technology community in Brazil informed of the main developments, in this article we present the main data collected on potentially targeted attacks on existing ISH collectors...
Read More
May 22nd, 202430 de outubro de 2024
Rebecca BezerraBlog

Latin America in the crosshairs of cybercrime: increase in ransomware attacks worries organizations

By Ismael Rocha: In recent months, we have seen a significant drop in the activity of some of the most notorious ransomware groups. Several operations by international authorities have resulted in arrests and the dismantling of these criminals' infrastructures, impacting their ability to operate....
Read More
February 1st, 2024February 1st, 2024
Jaqueline SantosBlog

Cybersecurity Mesh: more efficient risk management 

While technological advances bring innovation and convenience, they also open the door to constantly evolving cyber threats. In today's information security landscape, the need to adapt and innovate has never been more imperative. According to a recent survey...
Read More
November 8th, 202310 de dezembro de 2024
Rebecca BezerraBlog

SIM Swap: understand how the scam works and how to protect yourself

By Caique Barqueta: SIM swapping poses a significant threat to organizations. Criminals can gain access to sensitive accounts and data by swapping phone SIM cards. Companies, especially telecommunications and process outsourcing companies, are prime targets. Security measures...
Read More
October 25th, 202310 de dezembro de 2024
Jaqueline SantosBlog

Clickjacking: one click can ruin everything

Brazil is in 2nd place in the ranking of countries most affected by cyber attacks in Latin America. And it leads the world in the rate of data leaks for the second year running, with more than 1 million Brazilians victims of...
Read More
October 20th, 202310 de dezembro de 2024
Rebecca BezerraBlog

IRoX Team threatens to attack Brazil. Learn how to protect your business

By ISH and SafeLabs: A group of cyber activists called 'IRoX Team' has announced a cyber war against Israel and its supporters, releasing dates for their cyber attacks. According to a post on a public messaging group, the group supports...
Read More
October 18th, 202310 de dezembro de 2024
Rebecca BezerraBlog

What is the life cycle of a ransomware attack like?

By Caique Barqueta: Our Threat Intelligence team, Heimdall, has analyzed and explained in detail the entire life cycle of a ransomware incident, exposing some details of the techniques used for initial access, persistence and lateral movement, as well as the impact...
Read More
September 27th, 202310 de dezembro de 2024
Rebecca BezerraBlog

Hackers use messaging app for cybercrime

By Caique Barqueta: We can say that Telegram is a messaging application that is being used by many people around the world for various purposes, whether for legal or illegal activities. For illegal purposes, Telegram...
Read More
May 3rd, 202310 de dezembro de 2024
Rebecca BezerraBlog

New version of mobile malware identified

ISH Tecnologia, through its threat intelligence team, Heimdall, presents some details about the operation of Brata RAT, a Remote Access Trojan (RAT) designed to target Android devices. Brata RAT was identified in 2019, known...
Read More
April 18th, 202310 de dezembro de 2024
Rebecca BezerraBlog

Medusa Group gains momentum by targeting companies around the world. See how they use encryption for data theft and DDoS attacks

By Caique Barqueta: Considered one of the most active Ransomware groups of 2023, Medusa has become a constantly evolving operation, including the method used to publish the victims' leaked data, which ends up spreading...
Read More
1 2 3 ... 7

Latest posts

  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025
  • O que uma VPN realmente protege — e por que ela não basta para sua segurança digital 6 de maio de 2025
  • Como o ransomware Akira usa dupla extorsão, RaaS e táticas psicológicas — e como se defender 15 de abril de 2025
  • Criptografia de ponta a ponta: como funciona e como ela protege seus dados? 8 de abril de 2025

Categories

Blog (214) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.