top of page
![](https://static.wixstatic.com/media/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.webp)
![NDR: Quais os benefícios de uma solução de Network Detection and Response?](https://static.wixstatic.com/media/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.jpg/v1/fill/w_340,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.webp)
![Monitoramento de Fluxo de Rede: Vantagens e Benefícios](https://static.wixstatic.com/media/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.jpg/v1/fill/w_339,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.webp)
![Ataques DDoS: Orientações para preparar sua defesa cibernética](https://static.wixstatic.com/media/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.jpg/v1/fill/w_340,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.webp)
![Zero Trust Network Access (ZTNA): A Evolução da VPN](https://static.wixstatic.com/media/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.jpg/v1/fill/w_339,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.webp)
Buscar
![](https://static.wixstatic.com/media/nsplsh_489f6a3632cd4154b6d83104909f0a59~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/nsplsh_489f6a3632cd4154b6d83104909f0a59~mv2.webp)
![Hackers do grupo de ransomware BlackCat atacam TV Record e cobram resgate milionário](https://static.wixstatic.com/media/nsplsh_489f6a3632cd4154b6d83104909f0a59~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/nsplsh_489f6a3632cd4154b6d83104909f0a59~mv2.webp)
International IT
- 11 de out. de 2022
- 2 min
Hackers do grupo de ransomware BlackCat atacam TV Record e cobram resgate milionário
Os hackers do grupo de ransomware BlackCat (também conhecido como ALPHV e Noberus) invadiram e sequestraram os arquivos de conteúdo da TV...
![](https://static.wixstatic.com/media/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.webp)
![Ataques DDoS: Orientações para preparar sua defesa cibernética](https://static.wixstatic.com/media/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.webp)
International IT
- 7 de out. de 2022
- 4 min
Ataques DDoS: Orientações para preparar sua defesa cibernética
Em geral, qualquer organização que tenha uma presença online, como empresas dos setores financeiro, varejo, saúde, entretenimento e...
![](https://static.wixstatic.com/media/nsplsh_3976446f67416d62453951~mv2_d_5536_3114_s_4_2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/nsplsh_3976446f67416d62453951~mv2_d_5536_3114_s_4_2.webp)
![RansomEXX: Ferrari sofre ataque e hackers vazam 7 GB de dados](https://static.wixstatic.com/media/nsplsh_3976446f67416d62453951~mv2_d_5536_3114_s_4_2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/nsplsh_3976446f67416d62453951~mv2_d_5536_3114_s_4_2.webp)
International IT
- 6 de out. de 2022
- 2 min
RansomEXX: Ferrari sofre ataque e hackers vazam 7 GB de dados
A montadora Ferrari confirmou o vazamento de alguns documentos internos. Na segunda-feira, o grupo de criminosos cibernéticos conhecido...
![](https://static.wixstatic.com/media/e57e4d_2a9d4e3d99e145ba8e1a91f0d3710a71~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_2a9d4e3d99e145ba8e1a91f0d3710a71~mv2.webp)
![SOC: Ciclo de Vida do Gerenciamento de Vulnerabilidades](https://static.wixstatic.com/media/e57e4d_2a9d4e3d99e145ba8e1a91f0d3710a71~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_2a9d4e3d99e145ba8e1a91f0d3710a71~mv2.webp)
International IT
- 5 de out. de 2022
- 2 min
SOC: Ciclo de Vida do Gerenciamento de Vulnerabilidades
Infelizmente, nenhuma segurança é perfeita. Incidentes podem e vão acontecer, por isso é importante estar preparado para eles. Uma...
![](https://static.wixstatic.com/media/e57e4d_87b1e2814b5a405d8eafba0d9795c4a6~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_87b1e2814b5a405d8eafba0d9795c4a6~mv2.webp)
![Chaos: Novo malware DDoS atinge dispositivos Linux e Windows](https://static.wixstatic.com/media/e57e4d_87b1e2814b5a405d8eafba0d9795c4a6~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_87b1e2814b5a405d8eafba0d9795c4a6~mv2.webp)
International IT
- 4 de out. de 2022
- 2 min
Chaos: Novo malware DDoS atinge dispositivos Linux e Windows
Um novo malware multiplataforma, batizado de Chaos, tem infectado vários dispositivos Windows e Linux, incluindo servidores corporativos,...
Confira todos os materiais gratuitos
bottom of page