Latest news

DDoS
Cybersecurity

What is a Distributed Denial-of-Service (DDoS) attack?

“The system is down”. This is something you may have heard before, referring to the unavailability or inoperability of a digital application or service. With the system down, important tasks may become jeopardized, disrupting ticketing at an airport or the admission of patients to a hospital. When these unforeseen outages are the result of deliberate […]

Read article
email
Cybersecurity

What can cybercriminals do with my email?

It’s not hard to imagine why cybercriminals would be interested in getting their hands on bank passwords or credit card details. Scammers, however, know how to exploit a lot of other information, including some possibly considered public. Email addresses are a good example of this. According to Cloudflare’s “Phishing Threats Report”, 90% of successful cyberattacks […]

Read article
personal data
Cybersecurity

What can cybercriminals do with my personal data?

In our digitalized world, personal data has become a valuable currency for cybercriminals. But what exactly can be done with this sensitive information? Cybercriminals can use your personal data in several illicit ways. Here are some of the most common uses: 1. Identity theft One of the most damaging uses of personal data is identity […]

Read article
AI
Cybersecurity

Artificial Intelligence: what AI has to do with you and cybersecurity

With the popularization of artificial intelligence chatbots, tech giants have kicked off a race against time to offer tools equipped with this type of technology. We now have tools capable of creating a variety of content with only a few prompts from the user.  How does AI work? In practice, a conversation with AI tends […]

Read article
SIM card
Cybersecurity

How to add a password to your SIM card and why it’s important

A SIM card password is a four-digit numerical code that blocks access to the operator’s network. In other words, failure to enter the correct password blocks the cell phone from making or receiving calls, sending or receiving messages, and surfing the internet using mobile data (3G, 4G or 5G). To activate this feature you usually […]

Read article
smishing scenarios
Cybersecurity

Smishing scenarios: learn more about some of the common pretexts and how to protect yourself!

SMS remains fertile ground for cybercriminals, with there no end to the spread of the so-called “smishing” scam. Smishing involves sending fake text messages to trick victims into clicking on malicious links, sharing personal information, or installing malware on their devices. In this article, we’ll explore some of the most common smishing scenarios and provide tips on […]

Read article
passwords browser
Cybersecurity

Do you save passwords in your browser? Understand why this is a bad security practice

Have you ever wondered if it’s safe to save your credentials, including your passwords, in your favorite browser? It’s often thought of as a practical way to save time. After all, it’s much more convenient not to have to type in your username and password every time you want to access a particular website, right? […]

Read article
crime as a service
Cybersecurity

Crime-as-a-service: how outsourcing cybercrime can affect your business

Have you ever heard of crime-as-a-service (CaaS)? It refers to a type of cybercrime in which cybercriminals offer illicit services to anyone looking to hire them: breaking into systems, stealing data, extortion, forging documents, among others.  In short, it’s a way to outsource cybercrime, reducing the risks and costs for those who hire them. Impacts […]

Read article
Vacation Notification Scam
Cybersecurity

Vacation Notification Scam: how to recognize and protect yourself from this type of fraud

We can agree on one thing: everyone deserves and enjoys a vacation, right? As the date approaches, what we want most is to get everything organized and avoid any obstacles to the planned break. Imagine you’re in exactly this situation, in your last week of pre-holiday work. Then, first thing in the morning, you receive […]

Read article
newsletter

Receba as
novidades em
seu email

    Mission accomplished!

    You'll receive new cybersecurity updates in your inbox weekly.

    Follow us on our social media:

    Instagram: @hackerrangers2
    LinkedIn: linkedin.com/company/hacker-rangers22