{"id":78361,"date":"2024-08-06T12:41:25","date_gmt":"2024-08-06T15:41:25","guid":{"rendered":"https:\/\/abes.org.br\/?p=78361"},"modified":"2024-08-06T08:46:42","modified_gmt":"2024-08-06T11:46:42","slug":"40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/","title":{"rendered":"40% of IT environments are exposed to high-risk attacks"},"content":{"rendered":"<p style=\"text-align: center;\">Vulnerabilities in macOS endpoints, low detection rate, weak passwords, difficulty in defending against ransomware are some findings from the Picus Blue Report 2024<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-78363 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/CLM-.jpg\" alt=\"\" width=\"449\" height=\"252\" \/><\/p>\n<p>40% of more than 136 million environments presented vulnerabilities that could give access to the domain administrator and, consequently, total control of the network by cybercriminals. This access allows attackers to control user accounts, security settings, and general network management. The information is from\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.picussecurity.com%2Fresource%2Freport%2Fblue-report-2024%3FhsLang%3Den-us&amp;xid=e169720ad0&amp;uid=72289334&amp;iid=5d413c8632&amp;pool=cts&amp;v=2&amp;c=1722616823&amp;h=a07ae80b49d914c124ab4f3a949a9800889fa7182c4fed9a2001d591de3c1608\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.picussecurity.com%252Fresource%252Freport%252Fblue-report-2024%253FhsLang%253Den-us%26xid%3De169720ad0%26uid%3D72289334%26iid%3D5d413c8632%26pool%3Dcts%26v%3D2%26c%3D1722616823%26h%3Da07ae80b49d914c124ab4f3a949a9800889fa7182c4fed9a2001d591de3c1608&amp;source=gmail&amp;ust=1723028717754000&amp;usg=AOvVaw2KyGPoKf9vPvJekgqiiR0w\"><strong>Picus Blue Report 2024<\/strong><\/a>, published by\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=http%3A%2F%2Fwww.clm.tech%2F&amp;xid=e169720ad0&amp;uid=72289334&amp;iid=5d413c8632&amp;pool=cts&amp;v=2&amp;c=1722616823&amp;h=54859f74c637b7e945ac25102f85a999dc59c62b3e7a16a156358aaff36d4cd1\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttp%253A%252F%252Fwww.clm.tech%252F%26xid%3De169720ad0%26uid%3D72289334%26iid%3D5d413c8632%26pool%3Dcts%26v%3D2%26c%3D1722616823%26h%3D54859f74c637b7e945ac25102f85a999dc59c62b3e7a16a156358aaff36d4cd1&amp;source=gmail&amp;ust=1723028717754000&amp;usg=AOvVaw2duflJ5PmWCiUJQHiarhg4\"><strong>CLM<\/strong><\/a>, a Latin American value-added distributor focused on information security, data protection, cloud and infrastructure for data centers, the company&#039;s main partner in Latin America.<\/p>\n<p>The president of CLM, Francisco Camargo, explains that access to the domain administrator needs to be one of the main concerns of security teams because this breach can lead hackers to have full control of a corporation&#039;s IT infrastructure. \u201cThe danger is too great! The domain administrator access level allows attackers to control user accounts, security settings and the entire network\u201d, he points out.<\/p>\n<p>The annual study\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.picussecurity.com%2Fresource%2Freport%2Fblue-report-2024%3FhsLang%3Den-us&amp;xid=e169720ad0&amp;uid=72289334&amp;iid=5d413c8632&amp;pool=cts&amp;v=2&amp;c=1722616823&amp;h=a07ae80b49d914c124ab4f3a949a9800889fa7182c4fed9a2001d591de3c1608\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.picussecurity.com%252Fresource%252Freport%252Fblue-report-2024%253FhsLang%253Den-us%26xid%3De169720ad0%26uid%3D72289334%26iid%3D5d413c8632%26pool%3Dcts%26v%3D2%26c%3D1722616823%26h%3Da07ae80b49d914c124ab4f3a949a9800889fa7182c4fed9a2001d591de3c1608&amp;source=gmail&amp;ust=1723028717754000&amp;usg=AOvVaw2KyGPoKf9vPvJekgqiiR0w\"><strong>Picus Blue Report 2024<\/strong><\/a>\u00a0was conducted by Picus Labs, a research unit at Picus Security, which analyzed more than 136 million attack simulations to evaluate the effectiveness of cybersecurity solutions used by companies. The report highlights the need for this validation of solutions and continuous fine-tuning, as the only way to discover high-risk attack paths.<\/p>\n<p><strong>Effectiveness of cybersecurity solutions in the real world<\/strong><br \/>\nPicus Security has observed significant variability between the performance of cybersecurity products in controlled environments versus real-world settings. Solutions that score 100% in assessments such as MITER ATT&amp;CK can, unfortunately, exhibit significant variability in effectiveness once deployed in diverse operational environments.<\/p>\n<p><strong>Easy-to-crack passwords<\/strong><br \/>\nIn addition to the constant evolution of cybercrime, hacktivism, and the use of AI for illicit purposes, cybersecurity continues to face common, recurring problems, such as weak passwords. \u201cIt is surprising to see that\u00a0<strong>25% of environments still use passwords that can be cracked<\/strong>\u00a0using common words\u201d, comments Camargo.<\/p>\n<p><strong>BlackByte was the most successful ransomware group<\/strong><br \/>\nWhen it comes to ransomware, the findings are equally concerning. BlackByte was the most difficult ransomware variant to defend against, with\u00a0<strong>only 17% success rate<\/strong>. BabLock and Hive followed closely, with prevention rates of 20% and 30% respectively.<\/p>\n<p>\u201cIt is crucial to adopt stronger and more effective cybersecurity measures, with proactive approaches such as breach and attack simulation (BAS). Cybersecurity needs to be seen as a continuous battle that requires attention, innovation and adaptation, and it is essential to understand the risk to improve defenses, correct critical vulnerabilities and improve the security posture\u201d, warns the executive.<\/p>\n<p><strong>Prevention up, detection down: a cyber defense paradox<\/strong><br \/>\nAlthough there has been a notable improvement in prevention effectiveness, which increased from 59% in 2023 to 69% in 2024, detection effectiveness has left something to be desired. O\u00a0<em>alert score<\/em>\u00a0fell from 16% to 12% in the same period. This reduction suggests that increased logging has not translated into better visibility and faster threat detection. The disparity points to the need for organizations to prioritize optimization across their entire detection engineering pipeline.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-78362 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/GRAFICO-cLM.jpg\" alt=\"\" width=\"635\" height=\"222\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/GRAFICO-cLM.jpg 635w, https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/GRAFICO-cLM-480x168.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 635px, 100vw\" \/><\/p>\n<p><strong>Challenges of Detection Rules in SIEM Systems<\/strong><br \/>\nMost of the issues that Picus identified in SIEM system detection rules were related to log collection (38%) and performance (33%). Inadequate log source consolidation affected 23% of cases, while unavailable (10%) and broken (5%) log sources further deepened detection challenges.<\/p>\n<p><strong>Vulnerabilities in macOS endpoints<\/strong><br \/>\nO\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.picussecurity.com%2Fresource%2Freport%2Fblue-report-2024%3FhsLang%3Den-us&amp;xid=e169720ad0&amp;uid=72289334&amp;iid=5d413c8632&amp;pool=cts&amp;v=2&amp;c=1722616823&amp;h=a07ae80b49d914c124ab4f3a949a9800889fa7182c4fed9a2001d591de3c1608\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.picussecurity.com%252Fresource%252Freport%252Fblue-report-2024%253FhsLang%253Den-us%26xid%3De169720ad0%26uid%3D72289334%26iid%3D5d413c8632%26pool%3Dcts%26v%3D2%26c%3D1722616823%26h%3Da07ae80b49d914c124ab4f3a949a9800889fa7182c4fed9a2001d591de3c1608&amp;source=gmail&amp;ust=1723028717754000&amp;usg=AOvVaw2KyGPoKf9vPvJekgqiiR0w\"><strong>Picus Blue Report 2024<\/strong><\/a>\u00a0showed that macOS endpoints were much more likely to be misconfigured or operate correctly without Endpoint Detection and Response (EDR) tools. As a result, macOS endpoints only prevented 23% of the simulated attacks, compared to 62% and 65% blocked by Windows and Linux. For Picus Security, this finding suggests that security teams are not allocating adequate resources to protect these systems.<\/p>","protected":false},"excerpt":{"rendered":"<p>Vulnerabilidades em endpoints macOS, baixa taxa de detec\u00e7\u00e3o, senhas fracas, dificuldade na defesa contra ransomware s\u00e3o algumas descobertas do Picus Blue Report 2024 40% dos mais de 136 milh\u00f5es de ambientes apresentaram vulnerabilidades que poderiam dar acesso ao administrador de dom\u00ednio e, consequentemente, a tomada total do controle da rede por cibercriminosos. Este acesso permite [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":78363,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[5871,108,5872,5347],"class_list":["post-78361","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-ambientes-de-ti","tag-ciberseguranca","tag-evolucao-do-cibercrime","tag-picus-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>40% dos ambientes de TI est\u00e3o expostos a ataques de alto risco - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"40% dos ambientes de TI est\u00e3o expostos a ataques de alto risco - ABES\" \/>\n<meta property=\"og:description\" content=\"Vulnerabilidades em endpoints macOS, baixa taxa de detec\u00e7\u00e3o, senhas fracas, dificuldade na defesa contra ransomware s\u00e3o algumas descobertas do Picus Blue Report 2024 40% dos mais de 136 milh\u00f5es de ambientes apresentaram vulnerabilidades que poderiam dar acesso ao administrador de dom\u00ednio e, consequentemente, a tomada total do controle da rede por cibercriminosos. Este acesso permite [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-06T15:41:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/CLM-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"839\" \/>\n\t<meta property=\"og:image:height\" content=\"471\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"40% dos ambientes de TI est\u00e3o expostos a ataques de alto risco\",\"datePublished\":\"2024-08-06T15:41:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/\"},\"wordCount\":756,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/CLM-.jpg\",\"keywords\":[\"ambientes de TI\",\"ciberseguran\u00e7a\",\"evolu\u00e7\u00e3o do cibercrime\",\"Picus Labs\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/\",\"name\":\"40% dos ambientes de TI est\u00e3o expostos a ataques de alto risco - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/CLM-.jpg\",\"datePublished\":\"2024-08-06T15:41:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/CLM-.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/CLM-.jpg\",\"width\":839,\"height\":471},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"40% dos ambientes de TI est\u00e3o expostos a ataques de alto risco\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"40% of IT environments are exposed to high-risk attacks - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/","og_locale":"en_US","og_type":"article","og_title":"40% dos ambientes de TI est\u00e3o expostos a ataques de alto risco - ABES","og_description":"Vulnerabilidades em endpoints macOS, baixa taxa de detec\u00e7\u00e3o, senhas fracas, dificuldade na defesa contra ransomware s\u00e3o algumas descobertas do Picus Blue Report 2024 40% dos mais de 136 milh\u00f5es de ambientes apresentaram vulnerabilidades que poderiam dar acesso ao administrador de dom\u00ednio e, consequentemente, a tomada total do controle da rede por cibercriminosos. Este acesso permite [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-08-06T15:41:25+00:00","og_image":[{"width":839,"height":471,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/CLM-.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"40% dos ambientes de TI est\u00e3o expostos a ataques de alto risco","datePublished":"2024-08-06T15:41:25+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/"},"wordCount":756,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/CLM-.jpg","keywords":["ambientes de TI","ciberseguran\u00e7a","evolu\u00e7\u00e3o do cibercrime","Picus Labs"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/","url":"https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/","name":"40% of IT environments are exposed to high-risk attacks - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/CLM-.jpg","datePublished":"2024-08-06T15:41:25+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/CLM-.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/CLM-.jpg","width":839,"height":471},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/40-dos-ambientes-de-ti-estao-expostos-a-ataques-de-alto-risco\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"40% dos ambientes de TI est\u00e3o expostos a ataques de alto risco"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 14:38:45","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/78361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=78361"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/78361\/revisions"}],"predecessor-version":[{"id":78364,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/78361\/revisions\/78364"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/78363"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=78361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=78361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=78361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}