{"id":5183,"date":"2020-04-27T11:18:36","date_gmt":"2020-04-27T14:18:36","guid":{"rendered":"https:\/\/www.lumiun.com\/blog\/?p=5183"},"modified":"2022-05-02T15:00:53","modified_gmt":"2022-05-02T18:00:53","slug":"a-semana-da-seguranca-da-informacao-edicao-no9","status":"publish","type":"post","link":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/","title":{"rendered":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba9"},"content":{"rendered":"<p>Nesta nona edi\u00e7\u00e3o da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o como funcionam os e-mail de extors\u00e3o, alerta da FEBRABAN, ataques de malware, ransomware e &#8220;credential stuffing&#8221;, v\u00eddeos sobre a explora\u00e7\u00e3o do medo atrav\u00e9s do coronav\u00edrus e passos para criar cultura de ciberseguran\u00e7a na empresa.<\/p>\n<hr \/>\n<h2 id=\"noticias\">Not\u00edcias<\/h2>\n<h3 id=\"ameaca-de-divulgacao-de-video-intimo-senha-exposta-e-pagamento-em-bitcoin-como-funcionam-os-e-mails-de-extorsao\"><a href=\"https:\/\/g1.globo.com\/economia\/tecnologia\/blog\/altieres-rohr\/post\/2020\/04\/23\/ameaca-de-divulgacao-de-video-intimo-senha-exposta-e-pagamento-em-bitcoin-como-funcionam-os-e-mails-de-extorsao.ghtml\" target=\"_blank\" rel=\"noopener noreferrer\">Amea\u00e7a de divulga\u00e7\u00e3o de v\u00eddeo \u00edntimo, senha exposta e pagamento em Bitcoin: como funcionam os e-mails de extors\u00e3o?<\/a><\/h3>\n<p>Hacker afirma que obteve senha invadindo o smartphone ou computador da v\u00edtima, mas e-mail \u00e9 falso e a amea\u00e7a n\u00e3o representa perigo.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Altieres Rohr em G1<\/em><\/span><\/p>\n<h3 id=\"febraban-alerta-para-aumento-de-golpes-durante-a-pandemia\"><a href=\"https:\/\/portal.febraban.org.br\/noticia\/3441\/pt-br\/\" target=\"_blank\" rel=\"noopener noreferrer\">FEBRABAN alerta para aumento de golpes durante a pandemia<\/a><\/h3>\n<p>Quadrilhas se aproveitam do aumento das transa\u00e7\u00f5es digitais causado pelo isolamento social para aplicar golpes e capturar dados de clientes; um deles est\u00e1 relacionado ao aux\u00edlio emergencial criado pelo governo federal.<\/p>\n<p><span style=\"color: #808080;\"><em>Em FEBRABAN<\/em><\/span><\/p>\n<h3 id=\"10-fatores-que-caracterizam-um-otimo-programa-de-ciberseguranca\"><a href=\"https:\/\/cio.com.br\/10-fatores-que-caracterizam-um-otimo-programa-de-ciberseguranca\/\" target=\"_blank\" rel=\"noopener noreferrer\">10 fatores que caracterizam um \u00f3timo programa de ciberseguran\u00e7a<\/a><\/h3>\n<p>Qu\u00e3o forte \u00e9 o seu programa de seguran\u00e7a? Esses dez indicadores ajudar\u00e3o voc\u00ea a reconhecer a grandeza em sua pr\u00f3pria organiza\u00e7\u00e3o e servir\u00e3o de guia<\/p>\n<p><span style=\"color: #808080;\"><em>Por Mary K. Pratt, para CSO internacional<\/em><\/span><\/p>\n<h3 id=\"ataques-hackers-contra-empresas-cresceram-148-em-marco\"><a href=\"https:\/\/canaltech.com.br\/seguranca\/ataques-hackers-contra-empresas-cresceram-148-em-marco-163768\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ataques hackers contra empresas cresceram 148% em mar\u00e7o<\/a><\/h3>\n<p>A ado\u00e7\u00e3o repentina de regimes de home office e a dificuldade maior de aplicar medidas de seguran\u00e7a para funcion\u00e1rios que trabalham de casa levou a um aumento de 148% no n\u00famero de ataques hackers contra empresas em mar\u00e7o.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Felipe Demartini em CanalTech<\/em><\/span><\/p>\n<h3 id=\"saiba-os-top-10-malware-mais-procurados-no-mundo\"><a href=\"https:\/\/computerworld.com.br\/2020\/04\/17\/saiba-os-top-10-malware-mais-procurados-no-mundo\/\" target=\"_blank\" rel=\"noopener noreferrer\">Saiba os top 10 malware mais procurados no mundo<\/a><\/h3>\n<p>Ranking elaborado pela Check Point Research traz diversos alertas<\/p>\n<p><span style=\"color: #808080;\"><em>Em ComputerWorld<\/em><\/span><\/p>\n<h3 id=\"novo-ransomware-tambem-rouba-dados-e-coloca-hospitais-na-mira\"><a href=\"https:\/\/canaltech.com.br\/seguranca\/novo-ransomware-tambem-rouba-dados-e-coloca-hospitais-na-mira-163696\/\" target=\"_blank\" rel=\"noopener noreferrer\">Novo ransomware tamb\u00e9m rouba dados e coloca hospitais na mira<\/a><\/h3>\n<p>Hospitais, centros m\u00e9dicos e institui\u00e7\u00f5es de sa\u00fade s\u00e3o os alvos preferidos de uma nova categoria de ransomware, batizada de \u201cdupla extors\u00e3o\u201d.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Felipe Demartini em CanalTech<\/em><\/span><\/p>\n<h3 id=\"brasil-e-o-4o-pais-mais-atacado-por-malware-financeiro-em-2019\"><a href=\"https:\/\/computerworld.com.br\/2020\/04\/22\/brasil-e-o-4o-pais-mais-atacado-por-malware-financeiro-em-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">Brasil \u00e9 o 4\u00ba pa\u00eds mais atacado por malware financeiro em 2019<\/a><\/h3>\n<p>Kaspersky revela que mais de um ter\u00e7o dos ataques financeiros em 2019 foi contra usu\u00e1rios corporativos<\/p>\n<p><span style=\"color: #808080;\"><em>Em ComputerWorld<\/em><\/span><\/p>\n<h3 id=\"o-que-e-credential-stuffing-e-como-se-proteger\"><a href=\"https:\/\/www.howtogeek.com\/668434\/what-is-credential-stuffing-and-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noopener noreferrer\">O que \u00e9 &#8220;credential stuffing&#8221;? E como se proteger<\/a><\/h3>\n<p>Um total de 500 milh\u00f5es de contas Zoom est\u00e3o \u00e0 venda na dark web gra\u00e7as ao &#8220;credential stuffing&#8221;.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Chris Hoffman em How-To Geek<\/em><\/span><\/p>\n<hr \/>\n<h2 id=\"videos\">V\u00eddeos<\/h2>\n<h3 id=\"webinar-como-cibercriminosos-estao-explorando-o-medo-do-coronavirus\"><a href=\"https:\/\/www.youtube.com\/watch?v=0wBbMs8t0D0&amp;feature=emb_title\" target=\"_blank\" rel=\"noopener noreferrer\">[WEBINAR] Como cibercriminosos est\u00e3o explorando o medo do coronav\u00edrus<\/a><\/h3>\n<p><iframe src=\"https:\/\/www.youtube.com\/embed\/0wBbMs8t0D0\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><span style=\"color: #808080;\"><em>Por Andr\u00e9 Luiz R. Silva em Blog da Axur<\/em><\/span><\/p>\n<h3 id=\"9-passos-para-criar-cultura-de-ciberseguranca-com-gamificacao\"><a href=\"https:\/\/www.youtube.com\/watch?v=8-bfC99XQ4Q\" target=\"_blank\" rel=\"noopener noreferrer\">9 passos para criar cultura de ciberseguran\u00e7a com gamifica\u00e7\u00e3o<\/a><\/h3>\n<div  id=\"_ytid_76007\"  width=\"800\" height=\"450\"  data-origwidth=\"800\" data-origheight=\"450\"  data-relstop=\"1\" data-facadesrc=\"https:\/\/www.youtube.com\/embed\/8-bfC99XQ4Q?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;iv_load_policy=1&#038;loop=0&#038;modestbranding=1&#038;fs=1&#038;playsinline=0&#038;controls=1&#038;color=red&#038;cc_lang_pref=&#038;rel=0&#038;autohide=2&#038;theme=dark&#038;\" class=\"__youtube_prefs__ epyt-facade epyt-is-override  no-lazyload\" data-epautoplay=\"1\" ><img decoding=\"async\" data-spai-excluded=\"true\" class=\"epyt-facade-poster skip-lazy\" loading=\"lazy\"  alt=\"YouTube player\"  src=\"https:\/\/i.ytimg.com\/vi\/8-bfC99XQ4Q\/maxresdefault.jpg\"  \/><button class=\"epyt-facade-play\" aria-label=\"Play\"><svg data-no-lazy=\"1\" height=\"100%\" version=\"1.1\" viewBox=\"0 0 68 48\" width=\"100%\"><path class=\"ytp-large-play-button-bg\" d=\"M66.52,7.74c-0.78-2.93-2.49-5.41-5.42-6.19C55.79,.13,34,0,34,0S12.21,.13,6.9,1.55 C3.97,2.33,2.27,4.81,1.48,7.74C0.06,13.05,0,24,0,24s0.06,10.95,1.48,16.26c0.78,2.93,2.49,5.41,5.42,6.19 C12.21,47.87,34,48,34,48s21.79-0.13,27.1-1.55c2.93-0.78,4.64-3.26,5.42-6.19C67.94,34.95,68,24,68,24S67.94,13.05,66.52,7.74z\" fill=\"#f00\"><\/path><path d=\"M 45,24 27,14 27,34\" fill=\"#fff\"><\/path><\/svg><\/button><\/div>\n<p><span style=\"color: #808080;\"><em>Por Perallis Channel<\/em><\/span><\/p>\n<hr \/>\n<h2 id=\"eventos\">Eventos<\/h2>\n<p><a href=\"https:\/\/www.sympla.com.br\/workshop-trabalho-remoto-e-produtividade-do-microsoft-teams__838903\" target=\"_blank\" rel=\"noopener noreferrer\">Workshop: Trabalho Remoto e Produtividade do Microsoft Teams<\/a><\/p>\n<ul>\n<li>28 de abril de 2020, 10h-10h40<\/li>\n<li>Evento online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.sympla.com.br\/home-office-decorrente-da-covid-19--mp-927-e-93620-lgpd-seguranca-de-dados-e-vulnerabilidade__838507\" target=\"_blank\" rel=\"noopener noreferrer\">Home Office Decorrente da Covid-19: MP 927 e 936\/20, LGPD, Seguran\u00e7a de Dados e Vulnerabilidade<\/a><\/p>\n<ul>\n<li>28 de abril de 2020, 16h-17h30<\/li>\n<li>Evento online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.sympla.com.br\/webinar-seguranca-na-internet---para-profissionais-e-estudantes__841811\" target=\"_blank\" rel=\"noopener noreferrer\">Webinar Seguran\u00e7a na Internet &#8211; Para profissionais e estudantes<\/a><\/p>\n<ul>\n<li>29 de abril de 2020, 19h30-21h<\/li>\n<li>Evento online<\/li>\n<\/ul>\n<hr \/>\n<h2 id=\"material\">Material<\/h2>\n<h3 id=\"apresentacao-vpn-empresarial\"><a href=\"https:\/\/www.lumiun.com\/materiais\/apresentacao-vpn-empresarial?utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\" target=\"_blank\" rel=\"noopener noreferrer\">Apresenta\u00e7\u00e3o: VPN Empresarial<\/a><\/h3>\n<p><a href=\"https:\/\/www.lumiun.com\/materiais\/apresentacao-vpn-empresarial?utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\"><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/lp-vpn-empresarial.png.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/lp-vpn-empresarial-500x338.png.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/lp-vpn-empresarial-768x518.png.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/lp-vpn-empresarial-380x257.png.webp 380w\" sizes=\"(max-width: 800px) 100vw, 800px\" type=\"image\/webp\"><img decoding=\"async\" class=\"aligncenter wp-image-5186 size-full webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/lp-vpn-empresarial.png\" alt=\"\" width=\"800\" height=\"540\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/lp-vpn-empresarial.png 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/lp-vpn-empresarial-500x338.png 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/lp-vpn-empresarial-768x518.png 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/lp-vpn-empresarial-380x257.png 380w\" sizes=\"(max-width: 800px) 100vw, 800px\"><\/picture><\/a><\/p>\n<p>Fa\u00e7a download da apresenta\u00e7\u00e3o VPN Empresarial. Novo recurso do Lumiun para aproximar os colaboradores externos.<\/p>\n<hr \/>\n<p>Voc\u00ea ainda n\u00e3o est\u00e1 inscrito na nossa newsletter para receber esse conte\u00fado semanalmente no e-mail? Ent\u00e3o inscreva-se atrav\u00e9s do link abaixo:<\/p>\n<p><a href=\"https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet\">https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet<\/a><\/p>\n<p>Compartilhe o link com seus colegas e amigos.<\/p>\n","protected":false},"excerpt":{"rendered":"Nesta nona edi\u00e7\u00e3o da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o como funcionam os e-mail de extors\u00e3o, alerta da FEBRABAN,&hellip;\n","protected":false},"author":1,"featured_media":5188,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"content-type":"","footnotes":""},"categories":[143],"tags":[106,190,191,146,44],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba9 | Lumiun Blog<\/title>\n<meta name=\"description\" content=\"Nesta nona edi\u00e7\u00e3o da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o como funcionam os e-mail de extors\u00e3o, malware, ransomware, &quot;credential stuffing&quot; e muito mais.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba9 | Lumiun Blog\" \/>\n<meta property=\"og:description\" content=\"Nesta nona edi\u00e7\u00e3o da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o como funcionam os e-mail de extors\u00e3o, malware, ransomware, &quot;credential stuffing&quot; e muito mais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/\" \/>\n<meta property=\"og:site_name\" content=\"Lumiun Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LumiunTecnologia\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-27T14:18:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-02T18:00:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Al\u00e9x de Oliveira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Al\u00e9x de Oliveira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/\"},\"author\":{\"name\":\"Al\u00e9x de Oliveira\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d\"},\"headline\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba9\",\"datePublished\":\"2020-04-27T14:18:36+00:00\",\"dateModified\":\"2022-05-02T18:00:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/\"},\"wordCount\":544,\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o.jpg\",\"keywords\":[\"ciberseguran\u00e7a\",\"credential stuffing\",\"extors\u00e3o\",\"hackers\",\"ransomware\"],\"articleSection\":[\"Semana da Seguran\u00e7a na Internet\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/\",\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba9 | Lumiun Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o.jpg\",\"datePublished\":\"2020-04-27T14:18:36+00:00\",\"dateModified\":\"2022-05-02T18:00:53+00:00\",\"description\":\"Nesta nona edi\u00e7\u00e3o da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o como funcionam os e-mail de extors\u00e3o, malware, ransomware, \\\"credential stuffing\\\" e muito mais.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#primaryimage\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o.jpg\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o.jpg\",\"width\":1200,\"height\":708},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.lumiun.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"name\":\"Lumiun Blog\",\"description\":\"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI\",\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\",\"name\":\"Lumiun Tecnologia\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"width\":1500,\"height\":930,\"caption\":\"Lumiun Tecnologia\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LumiunTecnologia\/\",\"https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/\",\"https:\/\/www.youtube.com\/LumiunNetwork\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d\",\"name\":\"Al\u00e9x de Oliveira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g\",\"caption\":\"Al\u00e9x de Oliveira\"},\"description\":\"Sou cofundador e CTO da Lumiun, onde lidero o desenvolvimento das nossas solu\u00e7\u00f5es de seguran\u00e7a de rede, com foco em usabilidade, performance e escalabilidade, atendendo tanto MSPs quanto decisores de TI em empresas que buscam controle e prote\u00e7\u00e3o eficaz da navega\u00e7\u00e3o corporativa.\",\"url\":\"https:\/\/www.lumiun.com\/blog\/author\/alex\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba9 | Lumiun Blog","description":"Nesta nona edi\u00e7\u00e3o da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o como funcionam os e-mail de extors\u00e3o, malware, ransomware, \"credential stuffing\" e muito mais.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/","og_locale":"pt_BR","og_type":"article","og_title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba9 | Lumiun Blog","og_description":"Nesta nona edi\u00e7\u00e3o da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o como funcionam os e-mail de extors\u00e3o, malware, ransomware, \"credential stuffing\" e muito mais.","og_url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/","og_site_name":"Lumiun Blog","article_publisher":"https:\/\/www.facebook.com\/LumiunTecnologia\/","article_published_time":"2020-04-27T14:18:36+00:00","article_modified_time":"2022-05-02T18:00:53+00:00","og_image":[{"width":1200,"height":708,"url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o.jpg","type":"image\/jpeg"}],"author":"Al\u00e9x de Oliveira","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Al\u00e9x de Oliveira","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#article","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/"},"author":{"name":"Al\u00e9x de Oliveira","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d"},"headline":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba9","datePublished":"2020-04-27T14:18:36+00:00","dateModified":"2022-05-02T18:00:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/"},"wordCount":544,"publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o.jpg","keywords":["ciberseguran\u00e7a","credential stuffing","extors\u00e3o","hackers","ransomware"],"articleSection":["Semana da Seguran\u00e7a na Internet"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/","url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/","name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba9 | Lumiun Blog","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#primaryimage"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o.jpg","datePublished":"2020-04-27T14:18:36+00:00","dateModified":"2022-05-02T18:00:53+00:00","description":"Nesta nona edi\u00e7\u00e3o da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o como funcionam os e-mail de extors\u00e3o, malware, ransomware, \"credential stuffing\" e muito mais.","breadcrumb":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#primaryimage","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o.jpg","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o.jpg","width":1200,"height":708},{"@type":"BreadcrumbList","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no9\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.lumiun.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba9"}]},{"@type":"WebSite","@id":"https:\/\/www.lumiun.com\/blog\/#website","url":"https:\/\/www.lumiun.com\/blog\/","name":"Lumiun Blog","description":"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI","publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.lumiun.com\/blog\/#organization","name":"Lumiun Tecnologia","url":"https:\/\/www.lumiun.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","width":1500,"height":930,"caption":"Lumiun Tecnologia"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LumiunTecnologia\/","https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/","https:\/\/www.youtube.com\/LumiunNetwork"]},{"@type":"Person","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d","name":"Al\u00e9x de Oliveira","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g","caption":"Al\u00e9x de Oliveira"},"description":"Sou cofundador e CTO da Lumiun, onde lidero o desenvolvimento das nossas solu\u00e7\u00f5es de seguran\u00e7a de rede, com foco em usabilidade, performance e escalabilidade, atendendo tanto MSPs quanto decisores de TI em empresas que buscam controle e prote\u00e7\u00e3o eficaz da navega\u00e7\u00e3o corporativa.","url":"https:\/\/www.lumiun.com\/blog\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/5183"}],"collection":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/comments?post=5183"}],"version-history":[{"count":2,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/5183\/revisions"}],"predecessor-version":[{"id":7991,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/5183\/revisions\/7991"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media\/5188"}],"wp:attachment":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media?parent=5183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/categories?post=5183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/tags?post=5183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}