News

trickbot.png

Trickbot: The malware that dethroned Emotet

27/04/2021
Listen to this article at the Podcast "CyberCast". After the end of Emotet's reign, which saw its infrastructure taken down by...
See More
typosquatting-attacking-techniques-extortion-with-typos-typos-picture-1-iqe14bhwb.jpg

Typosquatting

30/12/2020
“Typosquatting” is a scheme that hackers use to take advantage of typos, specifically the spelling errors made when typing a web address...
See More
remote-incident-response-services.jpg

Respond and Prevent- Security Incident Response Tools

29/12/2020
When we talk about incident security response, we must keep a close eye on the tools we need to deploy, how to determine, screen, contain, and...
See More
ransomware.jpg

What we can learn from Symrise

16/12/2020
We all have heard about the Symrise ransomware attack, but we need to think that this might be, in my opinion, just the beginning of a full scale...
See More
imagem1.jpg

Respond and Prevent – Security Environmental...

23/11/2020
In this article, we present the TOP 4 truths of Security Environmental Awareness because we believe that to ensure the cybersecurity best practices...
See More
cti-featured-image.jpg

Respond and Prevent - Security Incident Triage

21/10/2020
In this article, we will cover Security Incident Triage, how to combine local and global threat intelligence for effective triage.  When...
See More
vetores-de-ataque.jpg

Respond and Prevent - Types of Attack Vectors

28/09/2020
Every day we evolve our capabilities to respond to security incidents, however, it is necessary to highlight that hacker tools and techniques are...
See More
incident-response.jpg

Cybersecurity: Communicate, Respond and Prevent

21/09/2020
We know that there are several processes and procedures that can be used for your organization's security incident response plan. We also know...
See More