{"id":58429,"date":"2023-03-10T07:01:30","date_gmt":"2023-03-10T10:01:30","guid":{"rendered":"https:\/\/abes.org.br\/?p=58429"},"modified":"2023-03-08T07:07:35","modified_gmt":"2023-03-08T10:07:35","slug":"estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/","title":{"rendered":"IBM Study: Ransomware Persists Despite Improved Cybersecurity Detection Through 2022"},"content":{"rendered":"<p style=\"text-align: center\"><i>Attempts to hijack email conversations have intensified globally;<\/i><\/p>\n<p style=\"text-align: center\"><i>Ransomware attacks are no longer executed in months, but in days;<\/i><\/p>\n<p style=\"text-align: center\"><i>Retail is the most extorted sector in Brazil.<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>IBM Security released its annual X-Force Threat Intelligence Index report, which points out that, although the number of ransomware incidents in the world fell by only 4 percentage points from 2021 to 2022, in Brazil this drop was a considerable 12 percentage points. Furthermore, despite a higher success rate in detecting and preventing ransomware, attackers continued to innovate. The study shows that the average time to complete a ransomware attack decreased from 2 months to less than 4 days.<\/p>\n<p>According to the 2023 report, the implementation of backdoors \u2014 loopholes that allow remote access to systems \u2014 emerged as the second action of attackers last year in Brazil. Many of these backdoor cases were related to ransomware attempts, where defenders were able to detect the action before it was possible to implement the attack. The increase in backdoor deployments can be partially attributed to its high market value. X-Force noted that threat actors sell access to existing backdoors on the dark web for up to US\uff0410,000, compared to stolen credit card data, which sells for less than US\uff0410 today.<\/p>\n<p style=\"text-align: center\"><em>Data theft (32%), data leaks (22%) and data destruction (22%)<\/em><\/p>\n<p style=\"text-align: center\"><em> were the most common actions carried out by cybercriminals in Brazil<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-58430 alignleft\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/03\/Roberto-egler-IBM.jpeg\" alt=\"\" width=\"197\" height=\"197\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/03\/Roberto-egler-IBM.jpeg 299w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/03\/Roberto-egler-IBM-150x150.jpeg 150w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/03\/Roberto-egler-IBM-12x12.jpeg 12w\" sizes=\"(max-width: 197px) 100vw, 197px\" \/>\u201cIt is clear that attackers are being refined to gain efficiency in ransomware incidents, which is a well-known method of extortion here in the country. In addition, the implementation of backdoors has gained relevance, that is, cybercriminals are increasingly looking to spray their attack strategies, including reaching new economic sectors that were less highlighted in the last report. In this context, it is essential that companies envision a proactive threat-based security strategy and a well-tailored incident response plan that also considers the impact of an attack on the final victims,\u201d says Roberto Engler, Security Leader at IBM Brazil .<br \/>\nThe IBM Security X-Force Threat Intelligence Index tracks new and existing trends and attack patterns from billions of data points from network devices and endpoints, incident response engagements and other sources. Some of the main findings of the latest report in Brazil are:<\/p>\n<ul>\n<li><strong>The region becomes more important for cybercriminals.<\/strong>\u00a0While Latin America accounts for 12% of the attacks observed by the X-Force incident response team, the region is the fourth most attacked in the world. Brazil, Colombia, Mexico, Peru and Chile were the most attacked countries. Brazil, specifically, accounted for 67% of cases handled by X-Force.<\/li>\n<li><strong>Retail was the most attacked.<\/strong>\u00a0Incidents in Brazil bucked global industry trends. Retail moved from second place to become the most attacked in 2022, with 31% of cases handled by X-Force. The financial, insurance and energy sectors were the second most targeted, all with 19% of cases.<\/li>\n<li><strong>Data were the protagonists in the country last year.\u00a0<\/strong>Data theft (32%), data leaks (22%) and data destruction (22%) were the most common actions carried out by cybercriminals in Brazil, highlighting that without a \u201cpresumed breach\u201d, organizations are putting customer data at risk , partners and employees.<\/li>\n<li><strong>Ascension of new initial access vectors.\u00a0<\/strong>Last year, phishing and credential harvesting were the most common vectors observed by the X-Force team. This year, external remote services accounted for 33% of incidents in Brazil. The other cases were evenly split between exploitation of public-facing applications, misuse of valid domain accounts, and hardware additions.<\/li>\n<li><strong>Phishers \u201cgive up\u201d credit card data.\u00a0<\/strong>The number of cybercriminals targeting credit card information in phishing kits has dropped by 52% worldwide, indicating attackers are prioritizing personal information that can be sold for a higher price on the dark web or used for other operations. Spearphishing links were among the most common forms of phishing in Brazil.<\/li>\n<\/ul>\n<p>Some additional findings from the 2023 report include:<\/p>\n<ul>\n<li><strong>Cyber criminals use email conversations<\/strong>. Email conversation hijacking increased dramatically in 2022, with attackers using compromised accounts to join ongoing conversations by impersonating the original participant. X-Force noted that the monthly retry rate increased by 100% worldwide. In Latin America, email hijacking accounted for 11% of attacks.<strong>Extortion: the preferred method of threat actors<\/strong>. In Latin America, one of the most common impacts of cyberattacks in 2022 was extortion, mainly thanks to ransomware attacks or compromised corporate emails, mirroring the global trend. Cybercriminals target the most vulnerable sectors, companies and regions, using extortion schemes and applying high psychological pressure to force victims to pay ransom.<\/li>\n<li><strong>The most counterfeited brands include major tech companies.\u00a0<\/strong>Credentials stolen from these services are valuable for accessing the accounts victims use to manage their online presence. The 2021 list was more diverse, with brands from other sectors. X-Force believes this change is due to the increased ability to identify all brands that a phishing kit is capable of spoofing and not just the one brand that is configured on the kit by default.<\/li>\n<\/ul>\n<p>The study features data collected by IBM around the world to provide relevant insights into the global attack landscape and inform the security community about the threats most relevant to their organizations.<\/p>\n<p>Download the IBM Security X-Force Threat Intelligence Index 2023\u00a0<a href=\"https:\/\/s2302.imxsnd00.com\/link.php?code=bDpodHRwcyUzQSUyRiUyRnd3dy5pYm0uY29tJTJGcmVwb3J0cyUyRnRocmVhdC1pbnRlbGxpZ2VuY2UlMkY6MjQ2ODQ4ODYzNjpzYW5kcmFzYW50QGdtYWlsLmNvbTowMmE3NzA6M2M=\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/s2302.imxsnd00.com\/link.php?code%3DbDpodHRwcyUzQSUyRiUyRnd3dy5pYm0uY29tJTJGcmVwb3J0cyUyRnRocmVhdC1pbnRlbGxpZ2VuY2UlMkY6MjQ2ODQ4ODYzNjpzYW5kcmFzYW50QGdtYWlsLmNvbTowMmE3NzA6M2M%3D&amp;source=gmail&amp;ust=1678354433354000&amp;usg=AOvVaw3-L4k5jH6uzD5Us5q7Ei0B\">on here<\/a>.<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Tentativas de sequestrar conversas de e-mail se intensificaram globalmente; Ataques de ransomware n\u00e3o s\u00e3o mais executados em meses, mas em dias; Varejo \u00e9 o setor mais extorquido no Brasil. &nbsp; A IBM Security divulgou seu relat\u00f3rio anual X-Force Threat Intelligence Index que aponta que, embora o n\u00famero de incidentes de ransomware no mundo tenha ca\u00eddo [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[1394,908,3739,901],"class_list":["post-58429","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-cibercriminosos","tag-endpoints","tag-incidentes-de-ramsomware","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Estudo IBM: ransomware persiste apesar de melhorias na detec\u00e7\u00e3o em ciberseguran\u00e7a durante 2022 - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Estudo IBM: ransomware persiste apesar de melhorias na detec\u00e7\u00e3o em ciberseguran\u00e7a durante 2022 - ABES\" \/>\n<meta property=\"og:description\" content=\"Tentativas de sequestrar conversas de e-mail se intensificaram globalmente; Ataques de ransomware n\u00e3o s\u00e3o mais executados em meses, mas em dias; Varejo \u00e9 o setor mais extorquido no Brasil. &nbsp; A IBM Security divulgou seu relat\u00f3rio anual X-Force Threat Intelligence Index que aponta que, embora o n\u00famero de incidentes de ransomware no mundo tenha ca\u00eddo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-10T10:01:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/03\/Roberto-egler-IBM.jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Estudo IBM: ransomware persiste apesar de melhorias na detec\u00e7\u00e3o em ciberseguran\u00e7a durante 2022\",\"datePublished\":\"2023-03-10T10:01:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/\"},\"wordCount\":1034,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Roberto-egler-IBM.jpeg\",\"keywords\":[\"cibercriminosos\",\"endpoints\",\"incidentes de ramsomware\",\"Phishing\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/\",\"name\":\"Estudo IBM: ransomware persiste apesar de melhorias na detec\u00e7\u00e3o em ciberseguran\u00e7a durante 2022 - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Roberto-egler-IBM.jpeg\",\"datePublished\":\"2023-03-10T10:01:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Roberto-egler-IBM.jpeg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Roberto-egler-IBM.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Estudo IBM: ransomware persiste apesar de melhorias na detec\u00e7\u00e3o em ciberseguran\u00e7a durante 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Estudo IBM: ransomware persiste apesar de melhorias na detec\u00e7\u00e3o em ciberseguran\u00e7a durante 2022 - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/","og_locale":"en_US","og_type":"article","og_title":"Estudo IBM: ransomware persiste apesar de melhorias na detec\u00e7\u00e3o em ciberseguran\u00e7a durante 2022 - ABES","og_description":"Tentativas de sequestrar conversas de e-mail se intensificaram globalmente; Ataques de ransomware n\u00e3o s\u00e3o mais executados em meses, mas em dias; Varejo \u00e9 o setor mais extorquido no Brasil. &nbsp; A IBM Security divulgou seu relat\u00f3rio anual X-Force Threat Intelligence Index que aponta que, embora o n\u00famero de incidentes de ransomware no mundo tenha ca\u00eddo [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2023-03-10T10:01:30+00:00","og_image":[{"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/03\/Roberto-egler-IBM.jpeg","type":"","width":"","height":""}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Estudo IBM: ransomware persiste apesar de melhorias na detec\u00e7\u00e3o em ciberseguran\u00e7a durante 2022","datePublished":"2023-03-10T10:01:30+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/"},"wordCount":1034,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/03\/Roberto-egler-IBM.jpeg","keywords":["cibercriminosos","endpoints","incidentes de ramsomware","Phishing"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/","url":"https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/","name":"Estudo IBM: ransomware persiste apesar de melhorias na detec\u00e7\u00e3o em ciberseguran\u00e7a durante 2022 - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/03\/Roberto-egler-IBM.jpeg","datePublished":"2023-03-10T10:01:30+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/03\/Roberto-egler-IBM.jpeg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/03\/Roberto-egler-IBM.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/estudo-ibm-ransomware-persiste-apesar-de-melhorias-na-deteccao-em-ciberseguranca-durante-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Estudo IBM: ransomware persiste apesar de melhorias na detec\u00e7\u00e3o em ciberseguran\u00e7a durante 2022"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-18 16:06:46","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/58429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=58429"}],"version-history":[{"count":3,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/58429\/revisions"}],"predecessor-version":[{"id":58433,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/58429\/revisions\/58433"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=58429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=58429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=58429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}