Jul 19, 2023
The importance of digital forensics in cyber incidents
By Heimdall and ISH DFIR: As cyber incidents occur in organizations, it is critical...
Jul 12, 2023
Goodbye passwords: learn all about the passwordless movement
The use of complex, long and difficult passwords has been one of the main strategies to ensure...
Jul 05, 2023
8base Ransomware: Hackers ramp up double extortion attacks in recent months and use encryption to leak data
By Caique Barqueta: The 8base ransomware group first gained notoriety in early...
Jun 28, 2023
The danger is in your inbox: exponential rise in phishing puts companies on alert
The rise of phishing on email and collaboration platforms has been a worrying trend in the...
Jun 21, 2023
Cyber attacks and data theft: see how to protect your company
By Caique Barqueta: Ransomware attacks have been getting better and better. Cybercriminals are employing other...
Jun 07, 2023
Open Source: Understand if your strategy can compromise software security across industries
Open source has become increasingly popular in the technology industries. This is because...
May 31, 2023
Phishing campaigns continue to grow in Brazil. See the risks of credential leaks
By Ismael Rocha: Phishing attacks are one of the most common and damaging threats in...
May 24, 2023
Don't risk going offline: Learn how to defend against DDoS attacks
In 2022, DDoS attacks grew by 150% worldwide. This information was revealed by...
May 17, 2023
The lion is loose and so are the scammers: learn how to avoid fraud during your income tax return and protect your data
The Income Tax return period is always a time of concern for many...
May 11, 2023
Less cost and more performance: Learn how GRC can revolutionize your IT
GRC (Governance, Risk and Compliance) solutions enable a clearer view of all information...