Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
April 3rd, 202410 de dezembro de 2024
Rebecca BezerraBlog

CloAk ransomware encrypts data and operates with other groups to pressure ransom payments

By Heimdall: The CloAk Ransomware, which emerged between late 2022 and early 2023, represents a relatively new group of ransomware that has stood out mainly for its activities in Europe, with a special focus on Germany. This malware...
Read More
March 22nd, 202410 de dezembro de 2024
Rebecca BezerraBlog

Snatch: ransomware encrypts files and manages to avoid detection by antivirus. Find out more about its operation

By Heimdall: The Snatch Ransomware, in its operations, has affected various types of organizations, from the most varied segments. The group has apparently been active for approximately 5 years since it was first identified, adopting specific characteristics in its attacks, such as the use...
Read More
February 28, 202410 de dezembro de 2024
Rebecca BezerraBlog

Ransomware .infected: learn details about the operation of the MedusaLocker ransomware variant

By Heimdall and ISH DFIR: A ransomware variant of the MedusaLocker family, known as ".infected", identified in mid-September 2019, continues to operate and affect several organizations around the world. This ransomware works by encrypting...
Read More
October 18th, 202310 de dezembro de 2024
Rebecca BezerraBlog

What is the life cycle of a ransomware attack like?

By Caique Barqueta: Our Threat Intelligence team, Heimdall, has analyzed and explained in detail the entire life cycle of a ransomware incident, exposing some details of the techniques used for initial access, persistence and lateral movement, as well as the impact...
Read More
July 5th, 202310 de dezembro de 2024
Rebecca BezerraBlog

8base ransomware: hackers have increased double extortion attacks in recent months and use encryption to leak data

By Caique Barqueta: The 8base ransomware group first came to prominence in early March 2022, remaining relatively quiet after only a few attacks. They operate like other ransomware groups, through double extortion (encryption +...
Read More
June 21st, 202310 de dezembro de 2024
Rebecca BezerraBlog

Cyber attacks and data theft: here's how to protect your company

By Caique Barqueta: Ransomware attacks have become increasingly sophisticated. Cybercriminals are employing other extortion tactics, such as stealing information before encryption is carried out, acting as a "double extortion", since the actors demand...
Read More
February 6th, 202310 de dezembro de 2024
Jessica TrucatBlog

We warn of large-scale attacks against VMware ESXi Servers

By Caique Barqueta: Thousands of servers around the world are being hit by a large-scale hacker attack that demands Bitcoin for ransom. Countries such as Italy, France, Finland, the United States and Canada are being attacked. In France, for example, the...
Read More
December 13th, 2022December 13th, 2022
Jessica TrucatBlog

Ransomware as a Service (RaaS): the subscription service that most affects companies

By Caique Barqueta: Ransomware attacks are constantly on the rise. This increase is due to a new sales model, known as "Ransomware-as-a-Service" (RaaS). This model is subscription-based and allows affiliates to...
Read More
October 19, 202210 de dezembro de 2024
Jessica TrucatBlog

The dangers of LockBit 3.0 Ransomware for companies: understand how the malicious software operates

By Caique Barqueta: Ransomware is a very lethal type of malware for all technology assets. But what actually makes it dangerous? As the name implies, "ransom" means "Ransom" - so it's a piece of software...
Read More
July 14th, 202210 de dezembro de 2024
Jaqueline SantosBlog

The demand for ransomware as a service (RaaS) will increase and your company could be the next victim

Ransomware attacks are becoming increasingly sophisticated and complex, even evolving into an on-demand service (RaaS) among digital criminals, facilitating attacks and invasions of data systems and damaging thousands of companies every year. O...
Read More
1 2 3

Latest posts

  • GenAI na multinuvem: como a inteligência artificial amplia riscos cibernéticos e exige defesas automatizadas 16 de julho de 2025
  • Do login à invasão: como a Porta 22 se tornou alvo global e o que fazer para evitar ataques 25 de junho de 2025
  • Aplicativos maliciosos: entenda os riscos e saiba como proteger seus dispositivos 4 de junho de 2025
  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025

Categories

Blog (217) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.