Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
August 30th, 2023December 10th, 2024
Rebecca BezerraBlog

Main threat groups targeting Brazil: meet APT41

By Ismael Rocha: An advanced persistent threat (APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal information...
Read More
August 2nd, 2023December 10th, 2024
Rebecca BezerraBlog

The main threat groups targeting Brazil: meet the Lazarus Group

By Ismael Rocha: An advanced persistent threat (APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal information...
Read More
July 5th, 2023December 10th, 2024
Rebecca BezerraBlog

8base ransomware: hackers have increased double extortion attacks in recent months and use encryption to leak data

By Caique Barqueta: The 8base ransomware group first came to prominence in early March 2022, remaining relatively quiet after only a few attacks. They operate like other ransomware groups, through double extortion (encryption +...
Read More
June 28, 2023December 10th, 2024
Rebecca BezerraBlog

The danger is in your inbox: exponential increase in phishing puts companies on alert 

The increase in phishing on email and collaboration platforms has been a worrying trend in recent years, according to the State of Email Security report. According to the survey of 1,700 IT professionals, the most significant threats...
Read More
May 31, 2023December 10th, 2024
Rebecca BezerraBlog

Phishing campaigns continue to grow in Brazil. See the risks of credential leaks

By Ismael Rocha: Phishing attacks are one of the most common and damaging threats to digital security. They involve the use of fraudulent emails, fake websites and other deceptive techniques to obtain confidential information, such as passwords, numbers...
Read More
May 11, 2023December 10th, 2024
Jaqueline SantosBlog

Less costs and more performance: learn how GRC can revolutionize your IT 

GRC (Governance, Risk and Compliance) solutions allow for a clearer view of all the company's relevant information, integrating sectors, improving communication and increasing employee productivity.According to a study carried out by Bravo Research, it is expected...
Read More
May 3rd, 2023December 10th, 2024
Rebecca BezerraBlog

New version of mobile malware identified

ISH Tecnologia, through its threat intelligence team, Heimdall, presents some details about the operation of Brata RAT, a Remote Access Trojan (RAT) designed to target Android devices. Brata RAT was identified in 2019, known...
Read More
April 12th, 2023December 10th, 2024
ish_wpBlog

Find out how GRC and IRM can be your allies in risk management 

A procura por cobertura de seguros para risco cibernético aumentou quase 100% no Brasil, especialmente em função do aumento e da virulência dos ataques, principalmente de sequestros de sistemas com pedidos de resgate para recuperação, o Ransomware.  O risco cibernético…
Read More
29 de março de 2023December 10th, 2024
Rebecca BezerraBlog

Entenda a venda e distribuição de ransomware em mercados e fóruns da Deep e Dark Web

Por Caique Barqueta: O software malicioso do tipo ransomware é uma ameaça que restringe o acesso a arquivos do host, sistemas ou até redes corporativas, sendo “liberado” apenas mediante ao pagamento de resgate do ataque. Essa lógica de ataque possui…
Read More
March 22nd, 2023December 10th, 2024
Rebecca BezerraBlog

Quanto custa o acesso à sua empresa? Identificamos operação em conjunto de 4 grupos de Ransomware

Por Caique Barqueta: Os custos de recuperação após um vazamento de dados pode ser mais caro do que o investimento em proteção e cibersegurança. Uma pesquisa mostra que o valor médio de um incidente é de R$ 23 milhões e,…
Read More
1 … 3 4 5 6 7 … 12

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.