Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
July 27th, 202210 de dezembro de 2024
Jaqueline SantosBlog

Incident response: what you need to know to support company protection initiatives

For a company to protect itself against cyber attacks, it needs to have a robust security policy, investments in technological resources and specialized manpower, as well as ensuring that employees are trained in security awareness. But to...
Read More
July 6th, 202210 de dezembro de 2024
Jaqueline SantosBlog, Business, Segurança

CXOs: Learn how they can combat risks and improve cyber security today

2021 was an overwhelming year for cybersecurity. In this period alone, the average total global cost of a ransomware breach was US$4.62 million according to IBM studies, and this trend will continue in the coming years....
Read More
June 30th, 202210 de dezembro de 2024
Jessica TrucatBlog

Accepting the risk of the cloud: the first step to making it more secure

Faced with the need to create and develop systems that help organizations' processes, infrastructure and business, cloud computing and virtualization are now part of most companies' reality. The downside of these technologies and...
Read More
June 1st, 202210 de dezembro de 2024
Jéssica TrucatBlog, Geral

Unprotected suppliers? Your company is at risk; understand the attack on the supply chain

As companies are increasingly exposed to the risks of cyber attacks against their supply chains, it has become more important than ever to take protective measures. Since their suppliers...
Read More
May 18th, 202210 de dezembro de 2024
Jéssica TrucatBlog, Geral, Insider, Reviews, Segurança, Technology, Trends

I've been attacked, now what? Learn how to prevent phishing and ransomware attacks, reducing business risks 

Phishing and Ransomware attacks have become a major security concern for all types of companies, regardless of their size or segment. These attacks are sneaky, but have a major impact on business and are capable of...
Read More
May 11, 202210 de dezembro de 2024
Jéssica TrucatBlog, Geral, On-the-go, Segurança, Trends

Crypto scams jeopardize the security of cryptocurrencies

The increase in scams using cryptocurrencies goes hand in hand with their value on the market. A cryptocurrency is an electronic currency that operates outside the control of governments and central banks, such as the Central Bank of Brazil....
Read More
DLL HIJACKING
March 28, 202210 de dezembro de 2024
Jaqueline SantosBlog, Insider

DLL Hijacking - injecting DLLs for evasion and persistence

There is a MITRE sub-technique for injecting DLLs, called DLL Hijacking. And in this post, you'll find a theoretical explanation and a simple proof of concept, with a DLL programmed in C++ that opens the Windows calculator...
Read More
Top 10 versions of Windows
February 10th, 202210 de dezembro de 2024
Jaqueline SantosBlog, Trends

The TOP 10 Windows versions with the most patches and how to update them

By Átila Altoé and Laura Cardillo It's now a Microsoft tradition to release updates for different editions of the operating system every Tuesday. That's why it's known as Patch Tuesday. And this week, we found out which 10 versions of Windows...
Read More
Exchange servers
January 6th, 202210 de dezembro de 2024
Jaqueline SantosBlog, Insider

The turn of the year was marked by e-mail problems on Exchange servers

By Alexandre Siviero, Atila Altoé and Laura Cardillo As soon as 2022 began, a problem in the component that scans attachments in emails on Exchange servers interrupted the messaging queues. One interesting point was the similarity of the programming flaw...
Read More
Group involved in the SolarWinds case
October 27th, 202110 de dezembro de 2024
Jaqueline SantosInsider, Blog

Group involved in SolarWinds case makes new attacks on supply chain

Nobelium, the group involved in the SolarWinds case, is replicating tactics from previous supply chain attacks with new approaches. Such attacks have been taking place in the United States and Europe since May 2021....
Read More
1 2 3 4 5 6

Latest posts

  • Do login à invasão: como a Porta 22 se tornou alvo global e o que fazer para evitar ataques 25 de junho de 2025
  • Aplicativos maliciosos: entenda os riscos e saiba como proteger seus dispositivos 4 de junho de 2025
  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025
  • O que uma VPN realmente protege — e por que ela não basta para sua segurança digital 6 de maio de 2025

Categories

Blog (216) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.