mar 24, 2022
How cyberwarfare changes the conflict between Russia and Ukraine
The conflict between Russia and Ukraine raises an important cybersecurity issue. A month ago the...
mar 23, 2022
Are we facing a cyber attack outbreak?
The war scenario in Ukraine and the lightning cyber attacks on various organizations around the world,...
mar 11, 2022
How to deal with AES encryption in malware analysis
In malware investigation, there are basically two types of analysis: static and dynamic. Simply put,...
mar 08, 2022
When your exposure on social networks becomes a threat to your company
On social networks, people let their guard down. They take advantage of their lunch break to check the...
mar 04, 2022
A show of support for the government of Russia led to the exposure of classified information from the Conti group
Following the Conti group's announcement of support for the Russian government, an anonymous person identified in the...
feb 10, 2022
The TOP 10 Windows versions with the most patches and how to update them
By Átila Altoé and Laura Cardillo It is already a tradition at Microsoft to release, every Tuesday, a new version of the software...
feb 09, 2022
"Inconvenient, insecure, and expensive. Is your company ready for a world without passwords?
When the world's largest software company decides to support a new technological approach, it's time...
Jan 26, 2022
Criminal investors empower ransomware; and here are some security solutions for businesses
A new trend in the cybercriminal environment is creating an economy that experts compare to the...
Jan 20, 2022
From phishing to malware, we analyze all steps of a fileless attack
By Alexandre Siviero The alert of a phishing campaign that distributed a malicious Power Point was made...
Jan 06, 2022
The turn of the year was marked by e-mail problems on Exchange servers
By Alexandre Siviero, Atila Altoé and Laura Cardillo As soon as 2022 began, a problem in the component...