{"id":63548,"date":"2023-06-14T14:18:58","date_gmt":"2023-06-14T17:18:58","guid":{"rendered":"https:\/\/abes.org.br\/?p=63548"},"modified":"2023-05-24T22:23:48","modified_gmt":"2023-05-25T01:23:48","slug":"microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/","title":{"rendered":"Microsoft releases fourth edition of Cyber Signals revealing risks of corporate email attacks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-63549 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/1200x800-MSFTInsider-BlogHeader-CyberSignals4-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" \/><\/p>\n<p>A\u00a0Microsoft est\u00e1 lan\u00e7ando a quarta edi\u00e7\u00e3o do <a href=\"https:\/\/news.microsoft.com\/wp-content\/uploads\/prod\/sites\/42\/2023\/05\/CSV4.5.workfile.comp15-TRADUCAO-pt-br_V2.pdf\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/news.microsoft.com\/wp-content\/uploads\/prod\/sites\/42\/2023\/05\/CSV4.5.workfile.comp15-TRADUCAO-pt-br_V2.pdf&amp;source=gmail&amp;ust=1685052233046000&amp;usg=AOvVaw1Nb3V_64GQz4snrPWv39Af\">Cyber Signals<\/a>, relat\u00f3rio que traz as tend\u00eancias, t\u00e1ticas e solu\u00e7\u00f5es mais importantes no cen\u00e1rio de amea\u00e7as digitais, trazendo um aumento na atividade cibercriminosa em torno do comprometimento de e-mail corporativo (BEC, na sigla em ingl\u00eas). Entre 2019 e 2022, a Microsoft observou um aumento de 38% neste tipo de crime, representando uma acelera\u00e7\u00e3o dos ataques cibern\u00e9ticos que custam \u00e0s organiza\u00e7\u00f5es centenas de milh\u00f5es de d\u00f3lares por ano.<a href=\"https:\/\/mail.google.com\/mail\/u\/0\/#m_3617140777251859390__edn1\" name=\"m_3617140777251859390__ednref1\">[i]<\/a><\/p>\n<p>Em 2022, a Equipe de Recupera\u00e7\u00e3o de Ativos (RAT) do FBI iniciou a Cadeia de Elimina\u00e7\u00e3o de Fraude Financeira (FFKC) computando 2.838 reclama\u00e7\u00f5es envolvendo transa\u00e7\u00f5es dom\u00e9sticas com perdas potenciais de mais de US$ 590 milh\u00f5es.<a href=\"https:\/\/mail.google.com\/mail\/u\/0\/#m_3617140777251859390__edn2\" name=\"m_3617140777251859390__ednref2\">[ii]<\/a>\u00a0Os ataques deste tipo de fraude distinguem-se na ind\u00fastria do cibercrime pela sua \u00eanfase na engenharia social e na arte de enganar.\u00a0 Entre abril de 2022 e abril de 2023, a Microsoft Threat Intelligence detectou e investigou 35 milh\u00f5es de tentativas de ataques, representando uma m\u00e9dia de 156 mil tentativas por dia.\u00a0<a href=\"https:\/\/mail.google.com\/mail\/u\/0\/#m_3617140777251859390__edn3\" name=\"m_3617140777251859390__ednref3\">[iii]<\/a><\/p>\n<p><strong>T\u00e1ticas BEC comuns<\/strong><\/p>\n<p>As tentativas de ataques BEC podem assumir muitas formas, incluindo telefonemas, mensagens de texto, e-mails ou alcance de m\u00eddia social. A representa\u00e7\u00e3o de mensagens de solicita\u00e7\u00e3o de autentica\u00e7\u00e3o e a representa\u00e7\u00e3o de indiv\u00edduos e empresas tamb\u00e9m s\u00e3o t\u00e1ticas comuns.<\/p>\n<p>Em vez de explorar vulnerabilidades em dispositivos sem atualiza\u00e7\u00e3o de seguran\u00e7a, os cibercriminosos exploram o universo do tr\u00e1fego de e-mail e outras mensagens para atrair as v\u00edtimas a fornecer informa\u00e7\u00f5es financeiras ou tomar uma a\u00e7\u00e3o direta, como enviar fundos, sem saber, para contas de \u201cmulas de dinheiro\u201d, que recebem valores de terceiros em sua conta e ajudam os cibercriminosos a realizar transfer\u00eancias fraudulentas.<\/p>\n<p>Urg\u00eancias inventadastaque de ransomware &#8220;barulhento&#8221; com mensagens de extors\u00e3o fortes e perturbadoras, estes cibercriminosos jogam um jogo de confian\u00e7a silencioso, usando prazos e urg\u00eancias inventados para estimular os destinat\u00e1rios, que podem estar distra\u00eddos ou acostumados com esses tipos de solicita\u00e7\u00f5es de \u00faltima hora. Em vez de novos malwares, estes cibercriminosos alinham suas t\u00e1ticas para se concentrar em ferramentas que melhorem a escala, a plausibilidade e a taxa de sucesso da caixa de entrada de mensagens maliciosas.<\/p>\n<p>A Microsoft observa uma tend\u00eancia significativa no uso \u00a0de\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/21\/catching-the-big-fish-analyzing-a-large-scale-phishing-as-a-service-operation\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/21\/catching-the-big-fish-analyzing-a-large-scale-phishing-as-a-service-operation\/&amp;source=gmail&amp;ust=1685052233046000&amp;usg=AOvVaw2G-6ZLSBj22KcAdemUHzYd\">plataformas como a BulletProftLink, um servi\u00e7o popular para\u00a0<\/a>criar campanhas de e-mail maliciosas em escala industrial, que vende um servi\u00e7o de ponta a ponta, incluindo modelos, hospedagem e \u00a0servi\u00e7os automatizados para BEC. Os cibercriminosos que usam esse CaaS tamb\u00e9m recebem endere\u00e7os IP para ajudar a orientar a segmenta\u00e7\u00e3o do ataque.<\/p>\n<p>O design do link descentralizado da ferramenta inclui n\u00f3s p\u00fablicos de blockchain de computadores da Internet para hospedar sites de phishing e BEC, criando estrutura descentralizada da web e ainda mais sofisticada e dif\u00edcil de interrompe. A distribui\u00e7\u00e3o da infraestrutura desses sites por meio da complexidade e do crescimento evolutivo das blockchains p\u00fablicas torna mais complexa a identifica\u00e7\u00e3o e as a\u00e7\u00f5es de remo\u00e7\u00e3o.<\/p>\n<p>&#8220;Como executiva de seguran\u00e7a, tenho a opini\u00e3o de que o uso de endere\u00e7os IP residenciais em v\u00e1rios ataques proeminentes \u00e9 motivo de preocupa\u00e7\u00e3o. A Microsoft reconhece e compartilha as preocupa\u00e7\u00f5es das ag\u00eancias federais internacionais, e de outras organiza\u00e7\u00f5es em rela\u00e7\u00e3o \u00e0 possibilidade de essa tend\u00eancia se expandir rapidamente, representando desafios significativos em termos de detec\u00e7\u00e3o de atividades suspeitas, que utilizam alarmes ou notifica\u00e7\u00f5es convencionais&#8221;, disse Vasu Jakkal, vice-presidente de Seguran\u00e7a, Conformidade, Identidade e Privacidade da Microsoft.<\/p>\n<p>Embora os cibercriminosos tenham criado ferramentas especializadas para facilitar o ataque BEC, incluindo kits de phishing e listas de endere\u00e7os de e-mail verificados direcionados a l\u00edderes de \u00e1reas como contas a pagar e outras fun\u00e7\u00f5es espec\u00edficas, as empresas podem utilizar m\u00e9todos para antecipar ataques e mitigar riscos. Simeon Kakpovi, analista s\u00eanior de intelig\u00eancia de amea\u00e7as da Microsoft, diz que &#8220;tudo o que \u00e9 necess\u00e1rio \u00e9 comprometer e-mail, phishing de credenciais, engenharia social e pura determina\u00e7\u00e3o&#8221;.<\/p>\n<p>Ataques visando e-mails corporativos oferecem um \u00f3timo exemplo de porque o risco cibern\u00e9tico precisa ser abordado de forma multifuncional com executivos e l\u00edderes, funcion\u00e1rios financeiros, gerentes de recursos humanos e outros com acesso a registros de funcion\u00e1rios, como n\u00fameros de seguridade social, declara\u00e7\u00f5es fiscais, informa\u00e7\u00f5es de contato e agendas, juntamente com funcion\u00e1rios de TI, conformidade e riscos cibern\u00e9ticos.<\/p>\n<p><strong>Recomenda\u00e7\u00f5es para combater o BEC<\/strong><\/p>\n<ul>\n<li><strong>Use uma solu\u00e7\u00e3o de e-mail segura:\u00a0<\/strong>as plataformas de nuvem atuais de e-mail usam recursos de IA, como aprendizado de m\u00e1quina para aprimorar as defesas, adicionar prote\u00e7\u00e3o avan\u00e7ada contra phishing e detec\u00e7\u00e3o de encaminhamento suspeito. Aplicativos em nuvem para e-mail e produtividade tamb\u00e9m oferecem os benef\u00edcios de atualiza\u00e7\u00f5es cont\u00ednuas e autom\u00e1ticas de software e gerenciamento centralizado de pol\u00edticas de seguran\u00e7a.<\/li>\n<li><strong>Proteger identidades para proibir movimentos laterais:<\/strong>\u00a0Proteger identidades \u00e9 um pilar fundamental no combate \u00e0 BEC. Controle o acesso a aplicativos e dados com Zero Trust e governan\u00e7a de identidade automatizada.<\/li>\n<li><strong>Adote uma plataforma de pagamento segura:\u00a0<\/strong>considere mudar de faturas enviadas por e-mail para um sistema projetado especificamente para autenticar pagamentos<strong>.<\/strong><\/li>\n<li><strong>Treine os funcion\u00e1rios para identificar sinais de alerta:<\/strong><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/cybersecurity-awareness?rtc=1\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.microsoft.com\/en-us\/security\/business\/cybersecurity-awareness?rtc%3D1&amp;source=gmail&amp;ust=1685052233046000&amp;usg=AOvVaw3Gfx76KiEk9Th-erFOFJEX\">\u00a0instrua continuamente os funcion\u00e1rios a identificar e-mails fraudulentos e\u00a0<\/a>outras mensagens mal-intencionadas, como uma incompatibilidade no dom\u00ednio e endere\u00e7os de e-mail, e o risco e o custo associados a ataques BEC bem-sucedidos.<\/li>\n<\/ul>\n<p>Para obter mais informa\u00e7\u00f5es e orienta\u00e7\u00f5es sobre intelig\u00eancia de amea\u00e7as, incluindo edi\u00e7\u00f5es anteriores do Cyber Signals, visite o\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-insider\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.microsoft.com\/en-us\/security\/business\/security-insider\/&amp;source=gmail&amp;ust=1685052233046000&amp;usg=AOvVaw3p0ZNifFmMua6jL-x4DuV1\">Security Insider<\/a>. Para saber mais sobre as solu\u00e7\u00f5es de seguran\u00e7a da Microsoft,\u00a0<a href=\"https:\/\/www.microsoft.com\/es-mx\/security\/?rtc=1\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.microsoft.com\/es-mx\/security\/?rtc%3D1&amp;source=gmail&amp;ust=1685052233046000&amp;usg=AOvVaw3yV-Dz5rjw_WyjAlUEZjnd\">visite nosso site<\/a>.<\/p>\n<p><a href=\"https:\/\/mail.google.com\/mail\/u\/0\/#m_3617140777251859390__ednref1\" name=\"m_3617140777251859390__edn1\">[i]<\/a>\u00a0Problema de sinais cibern\u00e9ticos # 4, Microsoft, 2023.<\/p>\n<p><a href=\"https:\/\/mail.google.com\/mail\/u\/0\/#m_3617140777251859390__ednref2\" name=\"m_3617140777251859390__edn2\">[ii]<\/a>\u00a0<a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\/springfield\/news\/internet-crime-complaint-center-releases-2022-statistics\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.fbi.gov\/contact-us\/field-offices\/springfield\/news\/internet-crime-complaint-center-releases-2022-statistics&amp;source=gmail&amp;ust=1685052233046000&amp;usg=AOvVaw3_v613lCK1dpG1mpmIsz8h\"><em>EmTernet Crime Complaint Center 2022 Estat\u00edsticas<\/em><\/a>, FFARIA.<\/p>\n<p><a href=\"https:\/\/mail.google.com\/mail\/u\/0\/#m_3617140777251859390__ednref3\" name=\"m_3617140777251859390__edn3\">[iii]<\/a>\u00a0Sinais Cibern\u00e9ticos. Ibid.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A\u00a0Microsoft est\u00e1 lan\u00e7ando a quarta edi\u00e7\u00e3o do Cyber Signals, relat\u00f3rio que traz as tend\u00eancias, t\u00e1ticas e solu\u00e7\u00f5es mais importantes no cen\u00e1rio de amea\u00e7as digitais, trazendo um aumento na atividade cibercriminosa em torno do comprometimento de e-mail corporativo (BEC, na sigla em ingl\u00eas). Entre 2019 e 2022, a Microsoft observou um aumento de 38% neste tipo [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":63549,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[4155,4154,4153,4152],"class_list":["post-63548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-blockchain-de-computadores","tag-campanhas-de-e-mail-maliciosas","tag-cyber-signals","tag-kits-de-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft lan\u00e7a quarta edi\u00e7\u00e3o do Cyber Signals revelando riscos dos ataques a e-mails corporativos - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft lan\u00e7a quarta edi\u00e7\u00e3o do Cyber Signals revelando riscos dos ataques a e-mails corporativos - ABES\" \/>\n<meta property=\"og:description\" content=\"A\u00a0Microsoft est\u00e1 lan\u00e7ando a quarta edi\u00e7\u00e3o do Cyber Signals, relat\u00f3rio que traz as tend\u00eancias, t\u00e1ticas e solu\u00e7\u00f5es mais importantes no cen\u00e1rio de amea\u00e7as digitais, trazendo um aumento na atividade cibercriminosa em torno do comprometimento de e-mail corporativo (BEC, na sigla em ingl\u00eas). Entre 2019 e 2022, a Microsoft observou um aumento de 38% neste tipo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-14T17:18:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/1200x800-MSFTInsider-BlogHeader-CyberSignals4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Microsoft lan\u00e7a quarta edi\u00e7\u00e3o do Cyber Signals revelando riscos dos ataques a e-mails corporativos\",\"datePublished\":\"2023-06-14T17:18:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/\"},\"wordCount\":1007,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/1200x800-MSFTInsider-BlogHeader-CyberSignals4.jpg\",\"keywords\":[\"blockchain de computadores\",\"campanhas de e-mail maliciosas\",\"Cyber Signals\",\"kits de phishing\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/\",\"name\":\"Microsoft lan\u00e7a quarta edi\u00e7\u00e3o do Cyber Signals revelando riscos dos ataques a e-mails corporativos - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/1200x800-MSFTInsider-BlogHeader-CyberSignals4.jpg\",\"datePublished\":\"2023-06-14T17:18:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/1200x800-MSFTInsider-BlogHeader-CyberSignals4.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/1200x800-MSFTInsider-BlogHeader-CyberSignals4.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft lan\u00e7a quarta edi\u00e7\u00e3o do Cyber Signals revelando riscos dos ataques a e-mails corporativos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft launches fourth edition of Cyber Signals revealing risks of attacks on corporate emails - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft lan\u00e7a quarta edi\u00e7\u00e3o do Cyber Signals revelando riscos dos ataques a e-mails corporativos - ABES","og_description":"A\u00a0Microsoft est\u00e1 lan\u00e7ando a quarta edi\u00e7\u00e3o do Cyber Signals, relat\u00f3rio que traz as tend\u00eancias, t\u00e1ticas e solu\u00e7\u00f5es mais importantes no cen\u00e1rio de amea\u00e7as digitais, trazendo um aumento na atividade cibercriminosa em torno do comprometimento de e-mail corporativo (BEC, na sigla em ingl\u00eas). Entre 2019 e 2022, a Microsoft observou um aumento de 38% neste tipo [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2023-06-14T17:18:58+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/1200x800-MSFTInsider-BlogHeader-CyberSignals4.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Microsoft lan\u00e7a quarta edi\u00e7\u00e3o do Cyber Signals revelando riscos dos ataques a e-mails corporativos","datePublished":"2023-06-14T17:18:58+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/"},"wordCount":1007,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/1200x800-MSFTInsider-BlogHeader-CyberSignals4.jpg","keywords":["blockchain de computadores","campanhas de e-mail maliciosas","Cyber Signals","kits de phishing"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/","url":"https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/","name":"Microsoft launches fourth edition of Cyber Signals revealing risks of attacks on corporate emails - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/1200x800-MSFTInsider-BlogHeader-CyberSignals4.jpg","datePublished":"2023-06-14T17:18:58+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/1200x800-MSFTInsider-BlogHeader-CyberSignals4.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/1200x800-MSFTInsider-BlogHeader-CyberSignals4.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/microsoft-lanca-quarta-edicao-do-cyber-signals-revelando-riscos-dos-ataques-a-e-mails-corporativos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Microsoft lan\u00e7a quarta edi\u00e7\u00e3o do Cyber Signals revelando riscos dos ataques a e-mails corporativos"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-18 19:27:16","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/63548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=63548"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/63548\/revisions"}],"predecessor-version":[{"id":63550,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/63548\/revisions\/63550"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/63549"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=63548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=63548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=63548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}