top of page
![](https://static.wixstatic.com/media/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.webp)
![NDR: Quais os benefícios de uma solução de Network Detection and Response?](https://static.wixstatic.com/media/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.jpg/v1/fill/w_340,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.webp)
![Monitoramento de Fluxo de Rede: Vantagens e Benefícios](https://static.wixstatic.com/media/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.jpg/v1/fill/w_339,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.webp)
![Ataques DDoS: Orientações para preparar sua defesa cibernética](https://static.wixstatic.com/media/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.jpg/v1/fill/w_340,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.webp)
![Zero Trust Network Access (ZTNA): A Evolução da VPN](https://static.wixstatic.com/media/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.jpg/v1/fill/w_339,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.webp)
Buscar
![](https://static.wixstatic.com/media/e57e4d_9065f61439b548359ecc3c25ed954ba1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_9065f61439b548359ecc3c25ed954ba1~mv2.webp)
![Lapsus$ Group: Polícia Federal prende criminoso cibernético](https://static.wixstatic.com/media/e57e4d_9065f61439b548359ecc3c25ed954ba1~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_9065f61439b548359ecc3c25ed954ba1~mv2.webp)
International IT
- 20 de out. de 2022
- 2 min
Lapsus$ Group: Polícia Federal prende criminoso cibernético
A Polícia Federal (PF) prendeu um suspeito de integrar a organização criminosa Lapsus$ Group, nesta quarta-feira (19/10), em Feira de...
![](https://static.wixstatic.com/media/e57e4d_0c572da3a06742cf807dfe4d6c8c7492~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_0c572da3a06742cf807dfe4d6c8c7492~mv2.webp)
![Hacker vinculado ao Lapsus$ pode estar por trás dos ataques a Uber e a Rockstar Games](https://static.wixstatic.com/media/e57e4d_0c572da3a06742cf807dfe4d6c8c7492~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_0c572da3a06742cf807dfe4d6c8c7492~mv2.webp)
International IT
- 22 de set. de 2022
- 2 min
Hacker vinculado ao Lapsus$ pode estar por trás dos ataques a Uber e a Rockstar Games
A Uber acredita que um hacker ligado ao grupo Lapsus$ estava por trás da invasão de seus sistemas na semana passada. A empresa revelou...
![](https://static.wixstatic.com/media/e57e4d_6539ea46932d458b8e4d9769b0482472~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_6539ea46932d458b8e4d9769b0482472~mv2.webp)
![Cisco confirma ataque do grupo de ransomware Yanluowang](https://static.wixstatic.com/media/e57e4d_6539ea46932d458b8e4d9769b0482472~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_6539ea46932d458b8e4d9769b0482472~mv2.webp)
International IT
- 11 de ago. de 2022
- 3 min
Cisco confirma ataque do grupo de ransomware Yanluowang
A Cisco Systems confirmou que foi vítima de um ataque cibernético em 24 de maio de 2022, depois que os invasores obtiveram acesso a conta...
![](https://static.wixstatic.com/media/e57e4d_d12ad2675d5d461496154a7cf324c041~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_d12ad2675d5d461496154a7cf324c041~mv2.webp)
![Principais violações de dados e ataques cibernéticos de 2022](https://static.wixstatic.com/media/e57e4d_d12ad2675d5d461496154a7cf324c041~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_d12ad2675d5d461496154a7cf324c041~mv2.webp)
International IT
- 5 de jul. de 2022
- 4 min
Principais violações de dados e ataques cibernéticos de 2022
Ataques cibernéticos, violações de dados, golpes digitais e ataques de ransomware continuaram em ritmo acelerado durante o primeiro...
![](https://static.wixstatic.com/media/e57e4d_a88273bf95f048e0bfe9961fcdfaa1c9~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_a88273bf95f048e0bfe9961fcdfaa1c9~mv2.webp)
![McDonald's Brasil confirma vazamento de dados de clientes](https://static.wixstatic.com/media/e57e4d_a88273bf95f048e0bfe9961fcdfaa1c9~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_a88273bf95f048e0bfe9961fcdfaa1c9~mv2.webp)
International IT
- 20 de abr. de 2022
- 2 min
McDonald's Brasil confirma vazamento de dados de clientes
A Arcos Dourados, empresa que gerencia a operação do McDonald’s no Brasil, confirmou o vazamento de dados e explicou que o problema se...
Confira todos os materiais gratuitos
bottom of page