Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
January 17th, 2024December 10th, 2024
Rebecca BezerraBlog

Cybercriminals use Stealer-type malware to steal cookies

By Heimdall: With various digital threats emerging every day, cybercriminals are undoubtedly betting on using stealer-type malware (focused on stealing information) to make a profit from the stolen data. As an example, we can mention the malware...
Read More
May 3rd, 2023December 10th, 2024
Rebecca BezerraBlog

New version of mobile malware identified

ISH Tecnologia, through its threat intelligence team, Heimdall, presents some details about the operation of Brata RAT, a Remote Access Trojan (RAT) designed to target Android devices. Brata RAT was identified in 2019, known...
Read More
February 15th, 2023December 10th, 2024
Jaqueline SantosBlog, Business

ChatGPT: The new ally of cybercriminals 

ChatGPT has become the internet's new favorite toy. The AI-driven natural language processing tool has quickly amassed over 1 million users worldwide. Technologies like ChatGPT have emerged to revolutionize and...
Read More
November 17th, 2022December 10th, 2024
Jessica TrucatBlog

Prilex Group is back: malware collects bank card data to carry out scams

By Caique Barqueta: Brazil is among the countries that suffer the most cyber attacks in the world, a scenario that has worsened after the pandemic and the global moment related to the armed conflict between Ukraine and Russia. Being up to date on...
Read More
September 15th, 2022December 10th, 2024
Jessica TrucatBlog

Malware Stealer: the silent information thief. See how to protect yourself from this threat!

By Caique Barqueta: One of today's main threats is stealer malware. In its translation, it is described as a "thief" of information, which can be various and sent to the attacker/invader. The information targeted by this...
Read More
emotet
May 9th, 2022December 10th, 2024
Jéssica TrucatBlog, Segurança

Learn about the new method of spreading Emotet malware and how to identify it

By Alexandre Siviero - Emotet is a trojan spread predominantly through fraudulent emails (malspam). The infection can arrive via malicious script, macro-enabled document files or malicious links. Emails containing Emotet can contain familiar promotions designed to...
Read More
AES encryption in malware analysis
March 11, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

How to deal with AES encryption in malware analysis

In malware research, there are basically two types of analysis: static and dynamic. Simply put, static analysis comprises all the ways of studying software without running it, while its dynamic counterpart is based on observing the program during...
Read More
Malicious Power Point
January 20th, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

From phishing to malware, we analyze all the stages of a fileless attack

By Alexandre Siviero The phishing alert that distributed a malicious Power Point was made by researchers Ankit Anubhav and Germán Fernández, who contacted the ISH team. These researchers attributed the threat to NjRAT, specifically...
Read More
August 13th, 2020December 10th, 2024
Jaqueline SantosBlog, Insights, On-the-go, Trends

Most malware still arrives by e-mail

No matter how many new vulnerabilities are disclosed on cybersecurity websites, there is one mode of operation that remains the most widely used and prevails in security incident statistics. Almost all malware, 94%, still reaches computers...
Read More
July 29, 2020December 10th, 2024
Jaqueline SantosBlog, General

7 reasons to pay for antivirus and ditch the free versions

Versions of antivirus software are gaining increasingly comprehensive protection features for operating systems such as Windows 10 and MacOS. As a result, the thinking is growing that paying for an antivirus service is no longer...
Read More
1 2

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.