feb 06, 2023
Alert for large-scale attacks against VMware ESXi Servers
By Caique Barqueta: Thousands of servers around the world are being hit by a hacker attack on...
feb 01, 2023
6 tips to protect your mobile bank account
PIX, cryptocurrencies, payment links, and credit card apps came...
Jan 24, 2023
Artificial Intelligence and IoT: See the main cybersecurity trends for 2023
By Caique Barqueta: The year 2022 was marked with several types of cyber attacks, bringing...
Jan 18, 2023
We explain how stolen credentials are sold on clandestine websites and forums
By Caíque Barqueta: Due to its great effectiveness, credential theft continues to be one of the...
Jan 11, 2023
User Awareness: The Weakest Link in Cybersecurity
When examining a data leak, it is almost always possible to point out inadequate security practices of the...
Jan 04, 2023
4 top phishing trends to watch out for in 2023
IT and cybersecurity teams have been facing several changes in the cyber environment, at ever increasing intervals...
Dec 22, 2022
How should companies execute the business continuity plan?
Being prepared to deal with a moment of crisis is as important as investing in technology...
Dec 13, 2022
Ransomware as a Service (RaaS): The Signature Service Most Affecting Enterprises
By Caique Barqueta: Ransomware attacks remain in constant growth. This increase is derived from...
Dec 07, 2022
Vulnerability management: what is it and why is it essential to protect your company?
The explosion of cyberattack cases against companies and users warns of a new pandemic, this one...
Nov 30, 2022
With the growth of IoT, companies need to ensure visibility and security
Despite some impacts from chip shortages and supply chain disruptions that slowed down...