Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
Top 10 versions of Windows
February 10th, 2022December 10th, 2024
Jaqueline SantosBlog, Trends

The TOP 10 Windows versions with the most patches and how to update them

By Átila Altoé and Laura Cardillo It's now a Microsoft tradition to release updates for different editions of the operating system every Tuesday. That's why it's known as Patch Tuesday. And this week, we found out which 10 versions of Windows...
Read More
Exchange servers
January 6th, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

The turn of the year was marked by e-mail problems on Exchange servers

By Alexandre Siviero, Atila Altoé and Laura Cardillo As soon as 2022 began, a problem in the component that scans attachments in emails on Exchange servers interrupted the messaging queues. One interesting point was the similarity of the programming flaw...
Read More
Group involved in the SolarWinds case
October 27th, 2021December 10th, 2024
Jaqueline SantosInsider, Blog

Group involved in SolarWinds case makes new attacks on supply chain

Nobelium, the group involved in the SolarWinds case, is replicating tactics from previous supply chain attacks with new approaches. Such attacks have been taking place in the United States and Europe since May 2021....
Read More
group that attacked the Colonial Pipeline
May 24, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, On-the-go, Trends

We explain how the group that attacked Colonial Pipeline operates; 13% of the victims were Brazilian companies

In recent days, the whole world has heard about the group that attacked Colonial Pipeline, called the DarkSide Ransomware Group. The attacks on large companies amounted to around U$90 million in Bitcoin. There have been at least 47 companies in the last 9...
Read More
Colonial Pipeline case
May 19th, 2021December 10th, 2024
Jaqueline SantosBlog, General, Insider, Trends

The Colonial Pipeline case shows that ransomware is more sophisticated; so is protecting yourself from it

When a giant like Colonial Pipeline, the largest oil pipeline operator in the United States, falls victim to ransomware with such catastrophic results, even triggering a crisis in the fuel market, the warning goes out to all other companies, from...
Read More
ongoing phishing campaign using Trickbot
April 8th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

We have identified a scam using Trickbot and here are our recommendations

ISH's threat intelligence team has detected an ongoing phishing campaign using Trickbot, a sophisticated Trojan first identified in 2016 and constantly updated. Trickbot is used to steal information from...
Read More
Costs of ransomware attack
March 11, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

This is one of the biggest costs in the event of a ransomware attack

Companies that are victims of a ransomware attack can take days, sometimes even weeks, to restore their systems after an event. And downtime can be very expensive. If services and operations are interrupted, there are many...
Read More
The key to security is threat response time
January 5th, 2021December 10th, 2024
Jaqueline SantosBlog, Trends

The key to containing attacks is the speed of the response time to threats

The impact of a cyber attack is measured by how long an attacker remains in a company's systems unnoticed. The longer inside an environment, the more access to critical systems. Therefore, the key to containing attacks...
Read More
It's not digital security in Brazil that needs to evolve, but the mentality
November 12th, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, On-the-go, Trends

It's not digital security in Brazil that needs to evolve, but the mentality

It's not digital security in Brazil that needs to evolve, but the mentality. Today we have at our disposal the same technologies used in other countries. What has advanced abroad, and not here, is that companies and institutions don't...
Read More
Pix scams and why we still fall for phishing attacks
November 6th, 2020December 10th, 2024
Jaqueline SantosBlog, Insights, On-the-go, Trends, Videos

Don't take the bait: Pix scams and why we still fall for phishing attacks

Pix goes live this month and phishing attacks are on the rise. There are Pix scams being registered, in which criminals take advantage of people's adherence to the novelty by creating fake registration links and pages that mimic websites...
Read More
1 2 3 4 5 6

Latest posts

  • Atenção ao risco digital: por que o setor aéreo precisa olhar para a cibersegurança com foco estratégico  10 de novembro de 2025
  • ISH é reconhecida mais uma vez como a maior empresa de TI do Espírito Santo no Anuário IEL 2025 6 de novembro de 2025
  • Banco Central reforça a cibersegurança e a governança com novas resoluções para o sistema financeiro  28 de outubro de 2025
  • Mês da Cibersegurança: o alerta que o Brasil não pode ignorar mais 22 de outubro de 2025

Categories

Blog (226) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.