{"id":74006,"date":"2024-04-30T07:51:48","date_gmt":"2024-04-30T10:51:48","guid":{"rendered":"https:\/\/abes.org.br\/?p=74006"},"modified":"2024-04-18T07:56:07","modified_gmt":"2024-04-18T10:56:07","slug":"ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/","title":{"rendered":"Cyber attacks almost double in five years, says Trend Micro report"},"content":{"rendered":"<p style=\"text-align: center;\"><em>Study reveals an increase of almost 350% in the detection of email malware in the last year, indicating a trend towards the use of malicious attachments in attacks<\/em><\/p>\n<p>Trend Micro&#039;s annual balance sheet<strong>,<\/strong>\u00a0global leader in cybersecurity, raises an alert for the need for companies to adapt their cybersecurity arsenal. In 2023, almost 161 billion attacks were blocked, 10% more than in 2022 and\u00a0<strong>almost double the number of threats recorded five years ago<\/strong>, which was approximately 82 million.<\/p>\n<div id=\"attachment_74007\" style=\"width: 607px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-74007\" class=\"wp-image-74007 size-full\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/unnamed-2-1.jpg\" alt=\"\" width=\"597\" height=\"278\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/unnamed-2-1.jpg 597w, https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/unnamed-2-1-480x224.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 597px, 100vw\" \/><p id=\"caption-attachment-74007\" class=\"wp-caption-text\">Attacks carried out via contaminated files, according to Trend Micro report<\/p><\/div>\n<p style=\"font-weight: 400;\">Analyzing the types of attacks carried out in 2023, it is noted\u00a0<strong>that attacks via contaminated files showed the greatest growth (35%,\u00a0<\/strong>as shown in the graph above), a strong indicator that attackers are selecting their victims more carefully. \u201cInstead of sending a huge number of emails or websites with malicious links, cyber criminals adopted the strategy of hitting fewer targets, but with greater potential for financial gain. They do this by bypassing layers of early detection such as network and email filters, which explains the increase in malicious files in\u00a0<em>endpoints<\/em>\u201d, details Cesar Candido, general director of Trend Micro in Brazil.<\/p>\n<p style=\"font-weight: 400;\">Other trends noted in the report include:<\/p>\n<ul style=\"font-weight: 400;\">\n<li>Variety and sophistication in Advanced Persistent Threat (APT) attacks\u00a0<em>Advanced Persistent Threat<\/em>), especially in defense evasion tactics;<\/li>\n<li>Email malware detections increased by almost 350%, while malicious URL and phishing detections fell by 27%, reemphasizing the trend of using malicious attachments in attacks;<\/li>\n<li>16% growth in Business Email Compromise (BEC) detections, also known as CEO fraud;<\/li>\n<li>14% drop in ransomware detections; however, the increase in file-based threat reporting may indicate that criminals are getting better at avoiding primary detection in LOLBins\/LOLBas (Living-off-the-Land Binaries and Scripts, which are native tools), BYOVD (from English, &#039;Bring Your Own Device&#039;), Zero Day explorations and AV (audio and video) solutions;<\/li>\n<li>Increase in remote and intermittent encryption, EDR (Endpoint Response) bypass using unmonitored virtual machines (VMs), and multi-ransomware attacks, in which victims are hit more than once. Attackers recognized EDR as an excellent defense, but now they are able to apply tactics<em>bypass&#039;<\/em>\u00a0to bypass technology;<\/li>\n<li>Thailand and the US were the most attacked by ransomware in 2023, with the banking sector being the main target of cybercrime;<\/li>\n<li>MITER ATT&amp;CK&#039;s main detections were defense evasion, Command &amp; Control, Initial Access, persistence and impact;<\/li>\n<li>Access to risky cloud applications was the top event detected by Trend Micro&#039;s attack surface risk management service, recording nearly 83 billion attempts;<\/li>\n<li>Trend Micro&#039;s Zero Day Initiative discovered and disclosed 1,914 Zero Day threats, an increase of 12% from the previous year. These included 111 Adobe Acrobat and Reader bugs. Adobe was most vulnerable software and PDF was the number one spam attachment type;<\/li>\n<li>Windows applications reached the top 3 in the ranking of exploited vulnerabilities that required virtual patches;<\/li>\n<li>Mimikatz (used in data collection) and Cobalt Strike (applied in Command &amp; Control) remain the preferred cybercrime tools.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">\u201cWe are blocking more threats than ever before and adversaries are increasingly showing greater variety and sophistication in their attacks, especially in defensive evasion. Our report highlights the need for proactive risk management across the entire attack surface, to understand adversaries\u2019 strategies and act effectively\u201d, recommends\u00a0<strong>Jon Clay, Vice President of Threat Intelligence at Trend Micro.<\/strong><\/p>\n<p style=\"font-weight: 400;\">Trend also advises that companies:<\/p>\n<ul style=\"font-weight: 400;\">\n<li>Work with trusted security providers that take a comprehensive approach to cybersecurity, ensuring not only the protection of the environment, but also continuous monitoring for new vulnerabilities;<\/li>\n<li>Prioritize SOC efficiency by carefully monitoring cloud applications as they become more integrated into daily operations;<\/li>\n<li>Make sure all the latest patches\/updates are applied to operating systems and apps;<\/li>\n<li>Utilize comprehensive security protocols to protect against vulnerabilities, enforce configuration settings, control application access, and enhance account and device security. Aim to detect ransomware attacks as early as possible, moving defenses through the initial access, lateral movement or data exfiltration stages.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Estudo revela aumento de quase 350% na detec\u00e7\u00e3o de malwares de e-mails no \u00faltimo ano, indicando uma tend\u00eancia de uso de anexos maliciosos nos ataques O balan\u00e7o anual da\u00a0Trend Micro,\u00a0l\u00edder global em ciberseguran\u00e7a, dispara um alerta para a necessidade de as empresas adequarem seu arsenal de seguran\u00e7a cibern\u00e9tica. Em 2023, foram bloqueadas quase 161 bilh\u00f5es [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":74008,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[5414,108,5412,5413],"class_list":["post-74006","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-ataque-cibernetico","tag-ciberseguranca","tag-deteccao-de-malwares","tag-url-maliciosas"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ataques cibern\u00e9ticos quase dobram em cinco anos, aponta relat\u00f3rio da Trend Micro - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ataques cibern\u00e9ticos quase dobram em cinco anos, aponta relat\u00f3rio da Trend Micro - ABES\" \/>\n<meta property=\"og:description\" content=\"Estudo revela aumento de quase 350% na detec\u00e7\u00e3o de malwares de e-mails no \u00faltimo ano, indicando uma tend\u00eancia de uso de anexos maliciosos nos ataques O balan\u00e7o anual da\u00a0Trend Micro,\u00a0l\u00edder global em ciberseguran\u00e7a, dispara um alerta para a necessidade de as empresas adequarem seu arsenal de seguran\u00e7a cibern\u00e9tica. Em 2023, foram bloqueadas quase 161 bilh\u00f5es [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-30T10:51:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/GRAFICO-TREND-MICRO.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"905\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Ataques cibern\u00e9ticos quase dobram em cinco anos, aponta relat\u00f3rio da Trend Micro\",\"datePublished\":\"2024-04-30T10:51:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/\"},\"wordCount\":833,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/GRAFICO-TREND-MICRO.jpg\",\"keywords\":[\"ataque cibern\u00e9tico\",\"ciberseguran\u00e7a\",\"detec\u00e7\u00e3o de malwares\",\"URL maliciosas\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/\",\"name\":\"Ataques cibern\u00e9ticos quase dobram em cinco anos, aponta relat\u00f3rio da Trend Micro - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/GRAFICO-TREND-MICRO.jpg\",\"datePublished\":\"2024-04-30T10:51:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/GRAFICO-TREND-MICRO.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/GRAFICO-TREND-MICRO.jpg\",\"width\":905,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ataques cibern\u00e9ticos quase dobram em cinco anos, aponta relat\u00f3rio da Trend Micro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattacks nearly double in five years, Trend Micro report finds - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/","og_locale":"en_US","og_type":"article","og_title":"Ataques cibern\u00e9ticos quase dobram em cinco anos, aponta relat\u00f3rio da Trend Micro - ABES","og_description":"Estudo revela aumento de quase 350% na detec\u00e7\u00e3o de malwares de e-mails no \u00faltimo ano, indicando uma tend\u00eancia de uso de anexos maliciosos nos ataques O balan\u00e7o anual da\u00a0Trend Micro,\u00a0l\u00edder global em ciberseguran\u00e7a, dispara um alerta para a necessidade de as empresas adequarem seu arsenal de seguran\u00e7a cibern\u00e9tica. Em 2023, foram bloqueadas quase 161 bilh\u00f5es [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-04-30T10:51:48+00:00","og_image":[{"width":905,"height":506,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/GRAFICO-TREND-MICRO.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Ataques cibern\u00e9ticos quase dobram em cinco anos, aponta relat\u00f3rio da Trend Micro","datePublished":"2024-04-30T10:51:48+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/"},"wordCount":833,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/GRAFICO-TREND-MICRO.jpg","keywords":["ataque cibern\u00e9tico","ciberseguran\u00e7a","detec\u00e7\u00e3o de malwares","URL maliciosas"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/","url":"https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/","name":"Cyberattacks nearly double in five years, Trend Micro report finds - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/GRAFICO-TREND-MICRO.jpg","datePublished":"2024-04-30T10:51:48+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/GRAFICO-TREND-MICRO.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/GRAFICO-TREND-MICRO.jpg","width":905,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/ataques-ciberneticos-quase-dobram-em-cinco-anos-aponta-relatorio-da-trend-micro\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Ataques cibern\u00e9ticos quase dobram em cinco anos, aponta relat\u00f3rio da Trend Micro"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-11 22:41:36","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/74006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=74006"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/74006\/revisions"}],"predecessor-version":[{"id":74009,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/74006\/revisions\/74009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/74008"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=74006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=74006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=74006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}