blog
Hacker Rangers Cyber Drops
More informed, more aware, more secure.
More informed, more aware, more secure.
Have you ever heard of crime-as-a-service (CaaS)? It refers to a type of cybercrime in which cybercriminals offer illicit services to anyone looking to hire them: breaking into systems, stealing data, extortion, forging documents, among others. In short, it’s a way to outsource cybercrime, reducing the risks and costs for those who hire them. Impacts […]
Have you ever heard the term OSINT? Though still largely unrecognized among the lay public, the concept is popular among technology professionals and even government investigative or law enforcement agencies. OSINT is the acronym for Open Source Intelligence, which should provide an initial idea of its meaning. In layman’s terms, OSINT involves using public sources […]
Read articleAny employee in any company, without exception, can fall victim to a cyberattack. Cybercriminals target everyone from the “big fish” like CEOs and other members of upper management, to junior professionals – and can even engineer an invasion through the privilege escalation method. However… things are much easier for the bad guys if they can […]
Read articleNow that you’ve learned what cryptography is and understand its importance in keeping sensitive information and data safe, it’s quite normal for questions to pop up: after all, what can I do to incorporate this expertise effectively and actively into my daily routine? Sure, cryptography is already “silently” present in many aspects of our daily […]
Read articleWhat is the first thing you think of when you hear or read the word “cryptography”? Those somewhat unfamiliar with the concept certainly imagine something extremely complex and technological, employing almost incomprehensible mathematical calculations to make life online safer. What few people know is that this craft is much older than cybersecurity – in fact, […]
Read articleIt may seem hard to believe, but there was a time when it was easy to identify whether you were on a secure website or not: all you had to do was check your browser’s address bar for the iconic green padlock, a visual representation that the page was protected by Hyper Text Transfer Protocol […]
Read articleImagine one day you lose access to the critical information required to do your job. Without it, it is impossible to continue, right? This is exactly the position a ransomware attack puts you in when infecting your computer. Ransomware is a type of malware that hijacks all the data stored on the device once it’s […]
Read articleImagine the following situation. You receive a call from a contact number on the screen that appears exactly the same as your bank’s telephone number. Everything should be just fine, right? So you answer. An employee calmly explains that there is a security problem with your account and that your password is required to prevent a […]
Read articleHave you ever heard of the term “shadow IT” or “invisible IT”? It refers to the indiscriminate use of devices, applications, and platforms that have not been authorized to be used for professional purposes by the IT department. This is an old problem, but one that is becoming increasingly common and difficult to contain – […]
Read articleAs the pillar that supports everything from the classic Bitcoin to all the latest crypto economy “inventions” (common tokens, non-fungible tokens, and even other cryptocurrencies), blockchain technology has always been seen as a true web revolution. It works like a ledger, facilitating the immutable registration of transactions and asset control in a given business network, […]
Read articleVocê está a poucos passos de sentir na pele o poder da gamificação para o seu programa de conscientização em cibersegurança.
We’ve successfully received your information and will be in touch soon.
Instagram: @hackerrangers
LinkedIn: linkedin.com/company/hacker-rangers
In this 30-minute demo, you’ll see how to get real-time reports from your teams (far beyond phishing), quickly build a scalable program, and achieve results no traditional training could ever offer.
We’ve successfully received your information and will be in touch soon.
Instagram: @hackerrangers
LinkedIn: linkedin.com/company/hacker-rangers