Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
April 20th, 2022December 10th, 2024
Jaqueline SantosBlog

Quick guide to Ransomware: data hijacking and why are companies at risk?

Quando se trata de segurança cibernética, empresas de todos os tamanhos e segmentos precisam lidar com um desafio comum: a abundância e gravidade dos ataques de ransomware. Cada vez mais usado por cibercriminosos, esse tipo de malware pode paralisar toda…
Read More
April 14th, 2022December 10th, 2024
Jessica TrucatBlog, Reviews, Security, Trends

Get to know the top threats affecting Brazil in the last month

Brazil is one of the countries that suffers the most cyber-attacks in the world - and this scenario has worsened considerably since the pandemic. Being aware of the threats on the rise in Brazil and around the world is becoming increasingly important and...
Read More
April 13th, 2022December 10th, 2024
Jaqueline SantosBlog, Security

How much is your data worth? For hackers, millions of dollars

We'd like to start by asking you to imagine the volume of information circulating in your company. Histories of confidential negotiations with clients, financial files such as annual profits, strategic information on the direction of operations and a multitude of other data from...
Read More
April 5th, 2022December 10th, 2024
Jéssica TrucatBlog, Insider, Segurança, Technology

BlackCat Ransomware: the attack that has companies around the world worried

BlackCat, also known as ALPHV, is a Ransomware as a Service - RaaS that has been gaining notoriety since November 2021, has been in the spotlight and has caused major damage to several companies around the world. This ransomware is...
Read More
Hive Group
March 30th, 2022December 10th, 2024
Jéssica TrucatBlog, Insider, Segurança

The Hive Ransomware Group that stood out in 2021 is back; learn how to protect yourself

The Hive Group has already been the subject of our security reports, due to its prominence in the cyber world. We bring back the topic of this ransomware, which today has a high possibility of correlation with Nokoyawa due to the sharing...
Read More
DLL HIJACKING
March 28, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

DLL Hijacking - injecting DLLs for evasion and persistence

There is a MITRE sub-technique for injecting DLLs, called DLL Hijacking. And in this post, you'll find a theoretical explanation and a simple proof of concept, with a DLL programmed in C++ that opens the Windows calculator...
Read More
Top 10 versions of Windows
February 10th, 2022December 10th, 2024
Jaqueline SantosBlog, Trends

The TOP 10 Windows versions with the most patches and how to update them

By Átila Altoé and Laura Cardillo It's now a Microsoft tradition to release updates for different editions of the operating system every Tuesday. That's why it's known as Patch Tuesday. And this week, we found out which 10 versions of Windows...
Read More
Malicious Power Point
January 20th, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

From phishing to malware, we analyze all the stages of a fileless attack

By Alexandre Siviero The phishing alert that distributed a malicious Power Point was made by researchers Ankit Anubhav and Germán Fernández, who contacted the ISH team. These researchers attributed the threat to NjRAT, specifically...
Read More
The key to security is threat response time
January 5th, 2021December 10th, 2024
Jaqueline SantosBlog, Trends

The key to containing attacks is the speed of the response time to threats

The impact of a cyber attack is measured by how long an attacker remains in a company's systems unnoticed. The longer inside an environment, the more access to critical systems. Therefore, the key to containing attacks...
Read More
Drones are a threat to cyber security
December 3rd, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Offline, On-the-go

Are drones a threat to cyber security?

The number of drones registered in Brazil increased by 51% from 2018 to 2019, jumping from 18,389 to 27,665 in that period. The data comes from the National Civil Aviation Agency (Anac). The Brazilian market for unmanned aerial vehicles has been growing,...
Read More
1 … 3 4 5 6 7

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.