Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
October 18th, 2023December 10th, 2024
Rebecca BezerraBlog

What is the life cycle of a ransomware attack like?

By Caique Barqueta: Our Threat Intelligence team, Heimdall, has analyzed and explained in detail the entire life cycle of a ransomware incident, exposing some details of the techniques used for initial access, persistence and lateral movement, as well as the impact...
Read More
September 27th, 2023December 10th, 2024
Rebecca BezerraBlog

Hackers use messaging app for cybercrime

By Caique Barqueta: We can say that Telegram is a messaging application that is being used by many people around the world for various purposes, whether for legal or illegal activities. For illegal purposes, Telegram...
Read More
May 3rd, 2023December 10th, 2024
Rebecca BezerraBlog

New version of mobile malware identified

ISH Tecnologia, through its threat intelligence team, Heimdall, presents some details about the operation of Brata RAT, a Remote Access Trojan (RAT) designed to target Android devices. Brata RAT was identified in 2019, known...
Read More
April 18th, 2023December 10th, 2024
Rebecca BezerraBlog

Medusa Group gains momentum by targeting companies around the world. See how they use encryption for data theft and DDoS attacks

By Caique Barqueta: Considered one of the most active Ransomware groups of 2023, Medusa has become a constantly evolving operation, including the method used to publish the victims' leaked data, which ends up spreading...
Read More
March 22nd, 2023December 10th, 2024
Rebecca BezerraBlog

Quanto custa o acesso à sua empresa? Identificamos operação em conjunto de 4 grupos de Ransomware

Por Caique Barqueta: Os custos de recuperação após um vazamento de dados pode ser mais caro do que o investimento em proteção e cibersegurança. Uma pesquisa mostra que o valor médio de um incidente é de R$ 23 milhões e,…
Read More
March 13th, 2023December 10th, 2024
Rebecca BezerraBlog

We analyze the AlphV Ransomware and its impact on organizations with personal data leaks

By Caique Barqueta: The ALPHV Ransomware, also known as BlackCat, Alphvm or Noberus; is a family of ransomware that uses the Ransomware-as-a-Service (RaaS) method in its operations. This ransomware was first detected in November 2021 and...
Read More
February 15th, 2023December 10th, 2024
Jaqueline SantosBlog, Business

ChatGPT: The new ally of cybercriminals 

ChatGPT has become the internet's new favorite toy. The AI-driven natural language processing tool has quickly amassed over 1 million users worldwide. Technologies like ChatGPT have emerged to revolutionize and...
Read More
February 6th, 2023December 10th, 2024
Jessica TrucatBlog

We warn of large-scale attacks against VMware ESXi Servers

By Caique Barqueta: Thousands of servers around the world are being hit by a large-scale hacker attack that demands Bitcoin for ransom. Countries such as Italy, France, Finland, the United States and Canada are being attacked. In France, for example, the...
Read More
January 24, 2023December 10th, 2024
Jessica TrucatBlog

Artificial Intelligence and IoT: see the main cybersecurity trends for 2023

Por Caique Barqueta: O ano de 2022 foi marcado com diversos tipos de ataques cibernéticos, trazendo muita turbulência para as equipes de cibersegurança das organizações. Diante disto, mencionamos os principais aspectos e tendências para que as empresas adotem e monitorem…
Read More
18 de janeiro de 2023December 10th, 2024
Jessica TrucatBlog

Explicamos como é feita a venda de credenciais roubadas em sites e fóruns clandestinos

Por Caíque Barqueta: Devido à sua grande efetividade, o roubo de credenciais continua sendo um dos métodos mais utilizados por cibercriminosos. Esse mercado é lucrativo, e uma vez com as credenciais, esses criminosos conseguem acessar banco de dados de empresas…
Read More
1 2 3 4 … 7

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.