São Paulo/SP – January 30, 2023. The term phishing comes from the English that means “capturing” confidential data, it is…
Read MoreCybersecurity and Digital Transformation *By Carlos Borella We know that Digital Transformation is not just about creating…
Read More*Renato Dante What is Code Review? Code review is a code review practice that is widely used…
Read More* By Antônio Silva Social engineering is a non-technical strategy used by cyber invaders, which depends a lot on…
Read More* By Gerson Lemos Controls and Methods of Information Security Definition One of the main security problems today is the…
Read More* By Vitória Silva Currently, any organizational environment, regardless of its size or type of business, fear cyber fraud,…
Read MoreSource: Robert Hamilton - Imperva Incapsula The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) released…
Read MoreMicrosoft patches two critical remote code execution (RCE) flaws that have been exploited in attacks
Microsoft released the June 2017 Patch Tuesday to address more than 90 security flaws, including two critical RCE that have…
Read MoreThe more and more cyberattacks make headlines around the world, consumers can easily be overwhelmed with warnings and technical instructions…
Read MoreBy IBM - Douglas Bonderud Cybercriminals are innovating. New attack vectors - everything from fansmitter information stealing to the rise…
Read More