Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
February 23, 202310 de dezembro de 2024
Jessica TrucatBlog

Fake boleto scam: understand how the tool used in bank fraud works and tips to protect yourself

Por Caíque Barqueta: O Reboleto ou KL Reboleto é um software com o intuito de interceptar todos os e-mails que são recebidos por uma conta. Após a interceptação, o cibercriminoso poderá realizar a alteração dos dados contidos em um PDF…
Read More
invoice phishing
April 25th, 202210 de dezembro de 2024
Jaqueline SantosBlog, Insider, On-the-go, Trends

We analyze an Ousaban malware campaign phishing for electronic invoices and income tax.

By Alexandre Siviero (updated April 29) - This is an analysis of a Brazilian banking malware first spotted in 2017, called Ousaban, or Javali. There is an ongoing campaign spreading this malware with phishing...
Read More
banking malware
December 30th, 202110 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights

Banking malware is common at this time of year and some good practices can prevent it

This time of year is the season for attacks and fraud involving Brazilian bank accounts. But there are good practices that can protect anyone from social engineering techniques and financial malware. In this post, you'll find guidelines on how not to...
Read More

Latest posts

  • Aplicativos maliciosos: entenda os riscos e saiba como proteger seus dispositivos 4 de junho de 2025
  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025
  • O que uma VPN realmente protege — e por que ela não basta para sua segurança digital 6 de maio de 2025
  • Como o ransomware Akira usa dupla extorsão, RaaS e táticas psicológicas — e como se defender 15 de abril de 2025

Categories

Blog (215) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.