Jul 06, 2022
CXOs: Learn how they can combat risk and improve cybersecurity today
The year 2021 was overwhelming for cybersecurity. In this period alone, the total cost...
Jun 30, 2022
Accepting Cloud Risk: The First Step to Making the Cloud Safer
Facing the need to create and develop systems that support business processes, infrastructure and...
Jun 22, 2022
Lockbit Ransomware: Malicious Software is Fastest and Worries Experts
LockBit ransomware is one of the most recent threats, it was seen in 2021 and is back with...
Jun 08, 2022
Crush or Hacker? This Valentine's Day, be careful not to fall for scams
As technology evolves, cyber scams take new forms and use the tools available...
Jun 01, 2022
Unprotected Suppliers? Your company is at risk; understand the supply chain attack
As companies are increasingly exposed to the risks of cyber attacks against...
May 27, 2022
The Danger of 'Invisible' Adversaries: Understand how they operate in the Windows system and learn how to identify them
By Ícaro César: In this report you will follow a Security Research - Emulation and Detection,...
May 25, 2022
The challenges of hiring cybersecurity professionals
Cyber attacks are taking the sleep away from many managers around the world, as...
May 19, 2022
VBS: Learn how to use this language to analyze malicious files
By Laura Cardillo and Attila Altoé: This is an analysis of a file transformed to VBS language,...
May 18, 2022
I was attacked, now what? Learn how to prevent phishing and ransomware attacks, reducing business risks
Phishing and Ransomware attacks have become a major security concern for all types of...
May 11, 2022
Crypto Scams Jeopardize Cryptocurrency Security
The increase in scams using cryptocurrencies goes hand in hand with their value...