{"id":72808,"date":"2024-03-15T08:19:18","date_gmt":"2024-03-15T11:19:18","guid":{"rendered":"https:\/\/abes.org.br\/?p=72808"},"modified":"2024-03-05T17:36:59","modified_gmt":"2024-03-05T20:36:59","slug":"relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/","title":{"rendered":"IBM cybersecurity report: identity is under attack in Brazil, harming companies&#039; recovery time after breaches"},"content":{"rendered":"<p style=\"text-align: center;\"><i>The country continued to be the most targeted in Latin America throughout 2023. More than half of the unauthorized accesses began with the exploitation of public applications<\/i><\/p>\n<p>IBM launched the\u00a0<a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/www.ibm.com\/reports\/threat-intelligence__;!!N96JrnIq8IfO5w!h-6v1oK4HKnivaxOmlude4SQ-DDRG9WI0iDkNh1ZT3GFlYJM3duc67JH41AyYCXiRP_rh6iiQ11IPb9Hx7gst-d89JJ7mg$&amp;source=gmail&amp;ust=1709724020060000&amp;usg=AOvVaw3HcPOdplFmZTPnmugZoDQI\">X-Force Threat Intelligence Index 2024<\/a>, highlighting an emerging global credentials crisis as cybercriminals have exploited users&#039; valid identities to compromise companies through improper access to corporate information. Worldwide, 71% of cyberattacks were caused by the exploitation of valid credentials. According to IBM X-Force, the offensive and defensive Security Services area of\u00a0<a href=\"https:\/\/www.ibm.com\/consulting\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/www.ibm.com\/consulting__;!!N96JrnIq8IfO5w!h-6v1oK4HKnivaxOmlude4SQ-DDRG9WI0iDkNh1ZT3GFlYJM3duc67JH41AyYCXiRP_rh6iiQ11IPb9Hx7gst-fxPyaiXw$&amp;source=gmail&amp;ust=1709724020060000&amp;usg=AOvVaw0R93qIqJa2nQ9EmTWTfIN_\">IBM Consulting<\/a>By 2023, cybercriminals have seen more opportunities to &#039;log in&#039; through valid accounts rather than &#039;hack&#039; into corporate networks. In Brazil, acquiring credentials and extracting data using legitimate tools were common and recurring actions among cybercriminals.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-72815 alignright\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/03\/unnamed-2-1024x534.png\" alt=\"\" width=\"370\" height=\"193\" \/>\u201cThe report highlights an emerging credentials crisis as cybercriminals have focused their efforts on stealing and compromising valid identities. This trend also impacts Latin America across all sectors and will likely increase as attackers invest in AI to optimize approaches,\u201d says F\u00e1bio Mucci, Software leader at IBM Security in Brazil. \u201cThis should keep us on our toes and reinforce our credential and access control strategies, as well as push us to promote a more holistic approach to security, especially in the era of generative AI.\u201d<\/p>\n<p>The X-Force Threat Intelligence Index is based on insights and observations from monitoring more than 150 billion security events per day, across more than 130 countries and locations, including Mexico, Central America, and South America. Additionally, data were collected and analyzed from multiple IBM sources such as IBM X-Force Threat Intelligence, Incident Response, X-Force Red,\u00a0<a href=\"https:\/\/www.ibm.com\/services\/managed-security\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/www.ibm.com\/services\/managed-security__;!!N96JrnIq8IfO5w!h-6v1oK4HKnivaxOmlude4SQ-DDRG9WI0iDkNh1ZT3GFlYJM3duc67JH41AyYCXiRP_rh6iiQ11IPb9Hx7gst-dVkgS7Iw$&amp;source=gmail&amp;ust=1709724020060000&amp;usg=AOvVaw0gXHTZRv22m6SMDA-uSJ56\">IBM Managed Security Services<\/a>, and data provided by\u00a0<a href=\"https:\/\/www.redhat.com\/en\/technologies\/management\/insights\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/www.redhat.com\/en\/technologies\/management\/insights__;!!N96JrnIq8IfO5w!h-6v1oK4HKnivaxOmlude4SQ-DDRG9WI0iDkNh1ZT3GFlYJM3duc67JH41AyYCXiRP_rh6iiQ11IPb9Hx7gst-ceK1xhmw$&amp;source=gmail&amp;ust=1709724020060000&amp;usg=AOvVaw1FaPiVu8x5tDbo9L_7XZJM\">Red Hat Insights<\/a>\u00a0and\u00a0<a href=\"https:\/\/intezer.com\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/intezer.com\/__;!!N96JrnIq8IfO5w!h-6v1oK4HKnivaxOmlude4SQ-DDRG9WI0iDkNh1ZT3GFlYJM3duc67JH41AyYCXiRP_rh6iiQ11IPb9Hx7gst-cy-3yofw$&amp;source=gmail&amp;ust=1709724020060000&amp;usg=AOvVaw3Kq3l5pZbEGGKMjgpO7tln\">Interzer<\/a>, which contributed to the 2024 report.<\/p>\n<p><strong>Some relevant discoveries from Brazil:\u00a0<\/strong><\/p>\n<p><strong>&gt;&gt;&gt; Brazil remains a main target.\u00a0<\/strong>Once again, the country was the most targeted in Latin America, representing almost 68% of the incidents highlighted by X-Force in the region. X-Force continues to watch\u00a0<a href=\"https:\/\/securityintelligence.com\/x-force\/x-force-hive0129-targeting-financial-institutions-latam-banking-trojan\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/securityintelligence.com\/posts\/x-force-hive0129-targeting-financial-institutions-latam-banking-trojan\/__;!!N96JrnIq8IfO5w!h-6v1oK4HKnivaxOmlude4SQ-DDRG9WI0iDkNh1ZT3GFlYJM3duc67JH41AyYCXiRP_rh6iiQ11IPb9Hx7gst-ci39nokg$&amp;source=gmail&amp;ust=1709724020060000&amp;usg=AOvVaw29EXXbVx7NGxVjUzUsr3Lj\">new and improved campaigns,\u00a0<\/a>specifically targeted at Latin America, highlighting a worrying trend of greater risk for the region in the future. <img loading=\"lazy\" decoding=\"async\" class=\"wp-image-72819 alignleft\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/03\/unnamed-5-1024x682.png\" alt=\"\" width=\"269\" height=\"179\" \/><\/p>\n<p><strong>&gt;&gt;&gt; At the industry level, there is a tie.\u00a0<\/strong>The Energy and Retail sectors were the most targeted, each recording 41% of cases. Additionally, X-Force has seen an increase in campaigns leveraging malicious Chrome extensions, most of which are concentrated in financial institutions in the region. IBM has also seen increased development and activity of .NET-based banking trojans targeting customers and account holders.<\/p>\n<p><strong>&gt;&gt;&gt; Attack routes.\u00a0<\/strong>In 2023, the main vector of initial access in Brazil was the exploration of public applications. In other words, taking advantage of weaknesses in computers or programs with Internet access represented 57% of the cases observed by X-Force. The use of phishing came in second place, totaling 29% of cases.<\/p>\n<p><strong>&gt;&gt;&gt; Most observed threat trends.<\/strong>\u00a0The most common actions in Brazil were evenly distributed between malware (ransomware), access to servers and use of legitimate tools (specifically tools for data exfiltration and credential acquisition). Regarding the impact of attacks, brand reputation implications and data leaks were the most experienced by organizations, with 25% each.<\/p>\n<p><strong>Other global discoveries involving Brazil and Latin America include:\u00a0<\/strong><\/p>\n<p><strong>&gt;&gt;&gt; A global credentials crisis about to get worse.\u00a0<\/strong>In 2023, X-Force saw attackers increasingly invest in operations to obtain user identities, with a 266% increase in information-stealing malware. This &#039;easy entry&#039; by attackers is one of the most difficult tactics to detect, generating high costs in companies&#039; response.<\/p>\n<p>&gt;&gt;&gt; \u201c<strong>Basic security\u201d may be harder to achieve than you think.\u00a0<\/strong>Nearly 85% of critical sector attacks could have been mitigated with a security patch, enabling multi-factor authentication or granting fewer privileges to users. This highlights the frequent need for organizations to stress test their technology environments to assess potential exposures and develop response plans for potential incidents.<\/p>\n<p><strong>&gt;&gt;&gt; The ROI of attacks against Generative AI (GAI) is yet to be achieved.\u00a0<\/strong>X-Force analysis projects indicate that when a single AGI technology approaches 50% market share or when the market consolidates into three or fewer technologies \u2013 this can trigger the maturity of AI as an attack surface, mobilizing more investment in new cybercriminal tools. Companies must also recognize that existing infrastructure is a gateway to AI models \u2013 which do not require new tactics on the part of cybercriminals \u2013 highlighting the need for a more holistic approach to security in the age of AGI, as outlined in\u00a0<a href=\"https:\/\/www.ibm.com\/blog\/announcement\/ibm-framework-for-securing-generative-ai\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/www.ibm.com\/blog\/announcement\/ibm-framework-for-securing-generative-ai\/__;!!N96JrnIq8IfO5w!h-6v1oK4HKnivaxOmlude4SQ-DDRG9WI0iDkNh1ZT3GFlYJM3duc67JH41AyYCXiRP_rh6iiQ11IPb9Hx7gst-c0QiEukA$&amp;source=gmail&amp;ust=1709724020060000&amp;usg=AOvVaw0eW2Bz0MpfeAeRwiCefszl\">IBM Framework to secure IAG<\/a>.<\/p>\n<p><strong>&gt;&gt;&gt; Everyone is vulnerable.\u00a0<\/strong>Red Hat Insights found that 92% of customers have at least one unaddressed known vulnerability or exposure (CVE) that can be exploited in their environment, while 80% of the top ten vulnerabilities detected across all systems in 2023 received a severity score of &#039;high&#039; &#039; or &#039;criticism&#039;.<\/p>\n<p><strong>&gt;&gt;&gt; Incorrect security settings.\u00a0<\/strong>X-Force Red penetration testing engagements indicate that security misconfigurations accounted for 30% of total exposures identified, noting more than 140 ways attackers can exploit misconfigurations.<\/p>\n<p style=\"font-weight: 400;\"><strong>Additional features:\u00a0<\/strong><\/p>\n<ul style=\"font-weight: 400;\">\n<li><a href=\"https:\/\/www.ibm.com\/account\/reg\/us-en\/signup?formid=urx-52629\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/www.ibm.com\/account\/reg\/us-en\/signup?formid%3Durx-52629__;!!N96JrnIq8IfO5w!h-6v1oK4HKnivaxOmlude4SQ-DDRG9WI0iDkNh1ZT3GFlYJM3duc67JH41AyYCXiRP_rh6iiQ11IPb9Hx7gst-cr4DHc3g$&amp;source=gmail&amp;ust=1709724020060000&amp;usg=AOvVaw3UJKs8O4VNun4iXKhjV8Rd\">Download<\/a>\u00a0a copy of the X-Force 2024 Threat Intelligence Index.<\/li>\n<li><a href=\"https:\/\/securityintelligence.com\/x-force\/2024-x-force-threat-intelligence-index\/?_ga=2.188631528.1720943815.1708449596-213660484.1651596245\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/securityintelligence.com\/x-force\/2024-x-force-threat-intelligence-index\/?_ga%3D2.188631528.1720943815.1708449596-213660484.1651596245__;!!N96JrnIq8IfO5w!h-6v1oK4HKnivaxOmlude4SQ-DDRG9WI0iDkNh1ZT3GFlYJM3duc67JH41AyYCXiRP_rh6iiQ11IPb9Hx7gst-em6tI41Q$&amp;source=gmail&amp;ust=1709724020060000&amp;usg=AOvVaw1t3VNsBcUwz4a_zbTzBqoE\">read<\/a>: about the main findings of the report in this IBM Security Intelligence blog.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Pa\u00eds continuou como o mais visado da Am\u00e9rica Latina ao longo de 2023. Mais da metade dos acessos indevidos teve in\u00edcio na explora\u00e7\u00e3o de aplica\u00e7\u00f5es p\u00fablicas A IBM lan\u00e7ou o\u00a0X-Force Threat Intelligence Index 2024,\u00a0destacando uma crise global emergente de credenciais \u00e0 medida que cibercriminosos t\u00eam explorado as identidades v\u00e1lidas dos usu\u00e1rios para comprometer empresas a [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":72827,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[108,125],"class_list":["post-72808","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-ciberseguranca","tag-ibm"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Relat\u00f3rio IBM sobre ciberseguran\u00e7a: identidade est\u00e1 sob ataque no Brasil, prejudicando o tempo de recupera\u00e7\u00e3o das empresas ap\u00f3s viola\u00e7\u00f5es - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Relat\u00f3rio IBM sobre ciberseguran\u00e7a: identidade est\u00e1 sob ataque no Brasil, prejudicando o tempo de recupera\u00e7\u00e3o das empresas ap\u00f3s viola\u00e7\u00f5es - ABES\" \/>\n<meta property=\"og:description\" content=\"Pa\u00eds continuou como o mais visado da Am\u00e9rica Latina ao longo de 2023. Mais da metade dos acessos indevidos teve in\u00edcio na explora\u00e7\u00e3o de aplica\u00e7\u00f5es p\u00fablicas A IBM lan\u00e7ou o\u00a0X-Force Threat Intelligence Index 2024,\u00a0destacando uma crise global emergente de credenciais \u00e0 medida que cibercriminosos t\u00eam explorado as identidades v\u00e1lidas dos usu\u00e1rios para comprometer empresas a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-15T11:19:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/03\/IBM-Relatorio.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1029\" \/>\n\t<meta property=\"og:image:height\" content=\"574\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Relat\u00f3rio IBM sobre ciberseguran\u00e7a: identidade est\u00e1 sob ataque no Brasil, prejudicando o tempo de recupera\u00e7\u00e3o das empresas ap\u00f3s viola\u00e7\u00f5es\",\"datePublished\":\"2024-03-15T11:19:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/\"},\"wordCount\":1070,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IBM-Relatorio.jpg\",\"keywords\":[\"ciberseguran\u00e7a\",\"IBM\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/\",\"name\":\"Relat\u00f3rio IBM sobre ciberseguran\u00e7a: identidade est\u00e1 sob ataque no Brasil, prejudicando o tempo de recupera\u00e7\u00e3o das empresas ap\u00f3s viola\u00e7\u00f5es - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IBM-Relatorio.jpg\",\"datePublished\":\"2024-03-15T11:19:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IBM-Relatorio.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IBM-Relatorio.jpg\",\"width\":1029,\"height\":574},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Relat\u00f3rio IBM sobre ciberseguran\u00e7a: identidade est\u00e1 sob ataque no Brasil, prejudicando o tempo de recupera\u00e7\u00e3o das empresas ap\u00f3s viola\u00e7\u00f5es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Relat\u00f3rio IBM sobre ciberseguran\u00e7a: identidade est\u00e1 sob ataque no Brasil, prejudicando o tempo de recupera\u00e7\u00e3o das empresas ap\u00f3s viola\u00e7\u00f5es - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/","og_locale":"en_US","og_type":"article","og_title":"Relat\u00f3rio IBM sobre ciberseguran\u00e7a: identidade est\u00e1 sob ataque no Brasil, prejudicando o tempo de recupera\u00e7\u00e3o das empresas ap\u00f3s viola\u00e7\u00f5es - ABES","og_description":"Pa\u00eds continuou como o mais visado da Am\u00e9rica Latina ao longo de 2023. Mais da metade dos acessos indevidos teve in\u00edcio na explora\u00e7\u00e3o de aplica\u00e7\u00f5es p\u00fablicas A IBM lan\u00e7ou o\u00a0X-Force Threat Intelligence Index 2024,\u00a0destacando uma crise global emergente de credenciais \u00e0 medida que cibercriminosos t\u00eam explorado as identidades v\u00e1lidas dos usu\u00e1rios para comprometer empresas a [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-03-15T11:19:18+00:00","og_image":[{"width":1029,"height":574,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/03\/IBM-Relatorio.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Relat\u00f3rio IBM sobre ciberseguran\u00e7a: identidade est\u00e1 sob ataque no Brasil, prejudicando o tempo de recupera\u00e7\u00e3o das empresas ap\u00f3s viola\u00e7\u00f5es","datePublished":"2024-03-15T11:19:18+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/"},"wordCount":1070,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/03\/IBM-Relatorio.jpg","keywords":["ciberseguran\u00e7a","IBM"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/","url":"https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/","name":"Relat\u00f3rio IBM sobre ciberseguran\u00e7a: identidade est\u00e1 sob ataque no Brasil, prejudicando o tempo de recupera\u00e7\u00e3o das empresas ap\u00f3s viola\u00e7\u00f5es - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/03\/IBM-Relatorio.jpg","datePublished":"2024-03-15T11:19:18+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/03\/IBM-Relatorio.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/03\/IBM-Relatorio.jpg","width":1029,"height":574},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/relatorio-ibm-sobre-ciberseguranca-identidade-esta-sob-ataque-no-brasil-prejudicando-o-tempo-de-recuperacao-das-empresas-apos-violacoes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Relat\u00f3rio IBM sobre ciberseguran\u00e7a: identidade est\u00e1 sob ataque no Brasil, prejudicando o tempo de recupera\u00e7\u00e3o das empresas ap\u00f3s viola\u00e7\u00f5es"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-27 13:04:56","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/72808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=72808"}],"version-history":[{"count":2,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/72808\/revisions"}],"predecessor-version":[{"id":72829,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/72808\/revisions\/72829"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/72827"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=72808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=72808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=72808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}