May 11, 2023
Less cost and more performance: Learn how GRC can revolutionize your IT
GRC (Governance, Risk and Compliance) solutions enable a clearer view of all information...
May 03, 2023
New Version of Mobile Malware Identified
ISH Technology, through its threat intelligence team, Heimdall, presents some details about...
Apr 18, 2023
Medusa group gains strength by targeting companies worldwide. See how they use encryption for data theft and DDoS attacks
By Caique Barqueta: Considered one of the most active Ransomware groups of 2023, Medusa has...
Apr 12, 2023
Discover how GRC and IRM can be your allies in risk management
The demand for insurance coverage for cyber risk has increased almost 100% in Brazil, especially in...
mar 29, 2023
Understand the sale and distribution of ransomware on Deep and Dark Web marketplaces and forums
By Caique Barqueta: Ransomware-type malicious software is a threat that restricts access...
mar 22, 2023
How much does it cost to access your company? We have identified 4 groups of Ransomware operating together
By Caique Barqueta: The costs of recovery after a data leak can be more expensive...
mar 17, 2023
Learn now what two-factor authentication is and why it is so important for social network security
The social network Twitter has undergone a series of changes since it was bought by...
mar 13, 2023
We analyze the AlphV Ransomware and its impacts to organizations with personal data leakage
By Caique Barqueta: The ALPHV Ransomware, also known as BlackCat, Alphvm or Noberus; is a family of...
mar 01, 2023
Internet of Senses raises cybersecurity concerns
The emergence of the Internet of Senses promises to offer a new reality experience for users. According to...
feb 23, 2023
Fake boleto scam: understand how the tool used in bank fraud works and tips to protect yourself
By Caíque Barqueta: Reboleto or KL Reboleto is a software with the intention of intercepting...