top of page
![](https://static.wixstatic.com/media/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.webp)
![NDR: Quais os benefícios de uma solução de Network Detection and Response?](https://static.wixstatic.com/media/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.jpg/v1/fill/w_340,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.webp)
![Monitoramento de Fluxo de Rede: Vantagens e Benefícios](https://static.wixstatic.com/media/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.jpg/v1/fill/w_339,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.webp)
![Ataques DDoS: Orientações para preparar sua defesa cibernética](https://static.wixstatic.com/media/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.jpg/v1/fill/w_340,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.webp)
![Zero Trust Network Access (ZTNA): A Evolução da VPN](https://static.wixstatic.com/media/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.jpg/v1/fill/w_339,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.webp)
Buscar
![](https://static.wixstatic.com/media/e57e4d_6ecf0359bde8499c86401594567653c7~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_6ecf0359bde8499c86401594567653c7~mv2.webp)
![Hackers brasileiros lançam ataques contra bancos em Portugal](https://static.wixstatic.com/media/e57e4d_6ecf0359bde8499c86401594567653c7~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_6ecf0359bde8499c86401594567653c7~mv2.webp)
International IT
- 31 de mai. de 2023
- 3 min
Hackers brasileiros lançam ataques contra bancos em Portugal
Hackers brasileiros invadiram várias instituições financeiras em Portugal, causando uma grande onda de preocupação e desafiando a...
![](https://static.wixstatic.com/media/e57e4d_6fe2b2d3e80545e59410fd02acd3bcdd~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_6fe2b2d3e80545e59410fd02acd3bcdd~mv2.webp)
![LockBit 3.0: Ransomware usa o Windows Defender para carregar o Cobalt Strike](https://static.wixstatic.com/media/e57e4d_6fe2b2d3e80545e59410fd02acd3bcdd~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_6fe2b2d3e80545e59410fd02acd3bcdd~mv2.webp)
International IT
- 2 de ago. de 2022
- 2 min
LockBit 3.0: Ransomware usa o Windows Defender para carregar o Cobalt Strike
Cibercriminosos associados à operação de Ransomware-as-a-Service (RaaS) LockBit 3.0 estão utilizando a ferramenta de linha de comando do...
![](https://static.wixstatic.com/media/e57e4d_76fab94103824ac4bcc51ca04c42b1ff~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_76fab94103824ac4bcc51ca04c42b1ff~mv2.webp)
![Microsoft Exchange Server: Hackers exploram falhas ProxyLogon e ProxyShell](https://static.wixstatic.com/media/e57e4d_76fab94103824ac4bcc51ca04c42b1ff~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_76fab94103824ac4bcc51ca04c42b1ff~mv2.webp)
International IT
- 22 de nov. de 2021
- 2 min
Microsoft Exchange Server: Hackers exploram falhas ProxyLogon e ProxyShell
Criminosos cibernéticos estão explorando vulnerabilidades ProxyLogon e ProxyShell em servidores Microsoft Exchange desatualizados através...
![](https://static.wixstatic.com/media/e57e4d_3872cc0d3b98489ba69d194973678197~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_3872cc0d3b98489ba69d194973678197~mv2.webp)
![Emotet botnet está de volta com a ajuda do malware TrickBot](https://static.wixstatic.com/media/e57e4d_3872cc0d3b98489ba69d194973678197~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_3872cc0d3b98489ba69d194973678197~mv2.webp)
International IT
- 17 de nov. de 2021
- 2 min
Emotet botnet está de volta com a ajuda do malware TrickBot
O malware Emotet, que já foi considerado o mais difundido no mundo, está de volta quase 10 meses depois que uma operação policial...
![](https://static.wixstatic.com/media/e57e4d_8b6a78e6f6eb46518c875df51d122ad0~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_8b6a78e6f6eb46518c875df51d122ad0~mv2.webp)
![Mekotio: Trojan bancário brasileiro volta a atacar com força na América Latina](https://static.wixstatic.com/media/e57e4d_8b6a78e6f6eb46518c875df51d122ad0~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_8b6a78e6f6eb46518c875df51d122ad0~mv2.webp)
International IT
- 4 de nov. de 2021
- 2 min
Mekotio: Trojan bancário brasileiro volta a atacar com força na América Latina
Um relatório da Check Point mostrou que a empresa detectou e bloqueou mais de 100 ataques cibernéticos em diversos países...
Confira todos os materiais gratuitos
bottom of page