{"id":15977,"date":"2025-01-08T14:06:26","date_gmt":"2025-01-08T14:06:26","guid":{"rendered":"https:\/\/hsclabs.com\/?p=15977"},"modified":"2025-05-27T13:07:31","modified_gmt":"2025-05-27T13:07:31","slug":"phishing-2025","status":"publish","type":"post","link":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/","title":{"rendered":"Phishing em 2025: o que mudou e como se proteger"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15977\" class=\"elementor elementor-15977\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9ce3e91 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9ce3e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8faa4d6\" data-id=\"8faa4d6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83c364c elementor-widget elementor-widget-ha-post-title happy-addon ha-post-title\" data-id=\"83c364c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ha-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"ha-post-title elementor-size-default\">Phishing em 2025: o que mudou e como se proteger<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28c4b11 elementor-widget elementor-widget-template\" data-id=\"28c4b11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"11928\" class=\"elementor elementor-11928\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b71fdbb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b71fdbb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bbf772c\" data-id=\"bbf772c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd4831a elementor-widget elementor-widget-post-info\" data-id=\"cd4831a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-f5a2311 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/2025\/01\/08\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-check\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Atualizado em<\/span>\n\t\t\t\t\t\t\t\t\t\t<time>8 janeiro  2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-ecb4e32 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/author\/hsc\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-user-circle\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t\t\t\tHSC\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c7d44b elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"0c7d44b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"627\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/01\/phishing-2025.jpg\" class=\"attachment-full size-full wp-image-16013\" alt=\"\" srcset=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/01\/phishing-2025.jpg 1200w, https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/01\/phishing-2025-300x157.jpg 300w, https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/01\/phishing-2025-1024x535.jpg 1024w, https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/01\/phishing-2025-768x401.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74f3992 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"74f3992\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2e615c elementor-widget elementor-widget-text-editor\" data-id=\"f2e615c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text false\">A tend\u00eancia para o phishing em 2025 \u00e9 que ele continue a ser uma das amea\u00e7as mais perigosas na ciberseguran\u00e7a, s\u00f3 que de forma ainda mais sofisticada. Com o avan\u00e7o de tecnologias como intelig\u00eancia artificial e deepfakes, os ataques de phishing est\u00e3o mais personalizados e dif\u00edceis de detectar, colocando em risco a seguran\u00e7a de empresas e indiv\u00edduos. <\/span><\/p><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text false\">O objetivo dos criminosos, por\u00e9m, continua o mesmo: enganar as v\u00edtimas para que forne\u00e7am informa\u00e7\u00f5es confidenciais, como senhas, dados banc\u00e1rios e informa\u00e7\u00f5es pessoais.<\/span><\/p><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text false\">Neste artigo, vamos explorar como os ataques de phishing est\u00e3o evoluindo e quais medidas as empresas podem tomar para se proteger em 2025. Confira!<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6fc146 elementor-widget elementor-widget-template\" data-id=\"c6fc146\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"11922\" class=\"elementor elementor-11922\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d745e8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d745e8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-82aa485\" data-id=\"82aa485\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-185f194 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"185f194\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;marker_view&quot;:&quot;bullets&quot;,&quot;icon&quot;:{&quot;value&quot;:&quot;far fa-dot-circle&quot;,&quot;library&quot;:&quot;fa-regular&quot;},&quot;no_headings_message&quot;:&quot;N\\u00e3o foram encontrados cabe\\u00e7alhos nesta p\\u00e1gina.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h2 class=\"elementor-toc__header-title\">\n\t\t\t\tPrincipais t\u00f3picos deste artigo\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__185f194\" aria-expanded=\"true\" aria-label=\"Abrir Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__185f194\" aria-expanded=\"true\" aria-label=\"Fechar Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__185f194\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31dbe05 elementor-widget elementor-widget-template\" data-id=\"31dbe05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"12009\" class=\"elementor elementor-12009\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section data-ha-partstyle=\"nasa\" data-ha-partcolor=\"\" data-ha-partopacity=\"0.4\" data-ha-partdirection=\"bottom\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6f97dd3 ha-particle-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default ha-particle-adv-no\" data-id=\"6f97dd3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-be74f27\" data-id=\"be74f27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b3233fa elementor-widget elementor-widget-heading\" data-id=\"b3233fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Veja como a HSC Labs melhorou a <b>seguran\u00e7a de e-mail<\/b> do MP-Bahia<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-541a906 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"541a906\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/hsclabs.com\/pt-br\/case-mpba-mailinspector\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leia o estudo de caso<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-49045f6\" data-id=\"49045f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51a2fe2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"51a2fe2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"401\" height=\"361\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/02\/case-sucesso-mailinspector-mpba.png\" class=\"attachment-large size-large wp-image-14078\" alt=\"\" srcset=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/02\/case-sucesso-mailinspector-mpba.png 401w, https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/02\/case-sucesso-mailinspector-mpba-300x270.png 300w\" sizes=\"(max-width: 401px) 100vw, 401px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bedcf8 elementor-widget elementor-widget-heading\" data-id=\"3bedcf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O que \u00e9 phishing?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2d7aea elementor-widget elementor-widget-text-editor\" data-id=\"e2d7aea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Antes de tudo, \u00e9 importante relembrarmos o conceito b\u00e1sico de <strong><a href=\"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/\">phishing<\/a><\/strong>.<\/span><\/p><p><span style=\"font-weight: 400;\">Phishing \u00e9 um tipo de ataque cibern\u00e9tico em que criminosos tentam enganar v\u00edtimas para que forne\u00e7am informa\u00e7\u00f5es confidenciais, como senhas, dados banc\u00e1rios ou informa\u00e7\u00f5es pessoais, por meio de mensagens fraudulentas.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Essas mensagens v\u00eam disfar\u00e7adas de comunica\u00e7\u00f5es leg\u00edtimas, como e-mails, mensagens de texto, ou at\u00e9 chamadas telef\u00f4nicas. Em geral, os criminosos tentam se fazer passar por um contato confi\u00e1vel, como um banco, uma loja conhecida ou at\u00e9 um colega de trabalho.<\/span><\/p><p><span style=\"font-weight: 400;\">Os ataques de phishing frequentemente incluem links para sites falsos, formul\u00e1rios ou anexos maliciosos que, ao serem acessados ou preenchidos, comprometem as informa\u00e7\u00f5es da v\u00edtima. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd023ff elementor-widget elementor-widget-heading\" data-id=\"dd023ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Principais tipos de phishing <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc778b2 elementor-widget elementor-widget-heading\" data-id=\"cc778b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Phishing via e-mail<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-347457e elementor-widget elementor-widget-text-editor\" data-id=\"347457e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Este \u00e9 o tipo mais comum de phishing. Os atacantes enviam e-mails fraudulentos se passando por empresas ou pessoas de confian\u00e7a, como bancos ou prestadores de servi\u00e7os. O objetivo \u00e9 enganar a v\u00edtima para que ela clique em links maliciosos ou abra anexos infectados, resultando no roubo de informa\u00e7\u00f5es pessoais ou instala\u00e7\u00e3o de malware.<\/span><\/p><p><span style=\"font-weight: 400;\">Embora seja uma amea\u00e7a comum, o phishing por e-mail \u00e9 grav\u00edssimo e n\u00e3o deve ser banalizado: estima-se que ele seja a porta de entrada para cerca de <strong><a href=\"https:\/\/www.cisa.gov\/shields-guidance-families\">90% dos ataques cibern\u00e9ticos<\/a><\/strong>.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ce898b elementor-widget elementor-widget-heading\" data-id=\"7ce898b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Spear Phishing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c3ef18 elementor-widget elementor-widget-text-editor\" data-id=\"8c3ef18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Diferente do phishing comum, o <strong><a href=\"https:\/\/hsclabs.com\/pt-br\/spear-phishing\/\">spear phishing<\/a><\/strong> \u00e9 altamente direcionado. Os criminosos fazem uma pesquisa detalhada sobre a v\u00edtima, coletando informa\u00e7\u00f5es como nome, cargo e hist\u00f3rico de comunica\u00e7\u00e3o, para criar mensagens personalizadas que parecem leg\u00edtimas. Esse tipo de ataque visa indiv\u00edduos ou grupos espec\u00edficos e \u00e9 mais dif\u00edcil de detectar devido \u00e0 sua personaliza\u00e7\u00e3o.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b25fce5 elementor-widget elementor-widget-heading\" data-id=\"b25fce5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Vishing (Voice Phishing)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00d2918 elementor-widget elementor-widget-text-editor\" data-id=\"00d2918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\"><strong><a href=\"https:\/\/hsclabs.com\/pt-br\/vishing\/\">Vishing<\/a><\/strong> envolve ataques de phishing por meio de chamadas telef\u00f4nicas. Em geral, os atacantes fingem ser representantes de empresas, como bancos ou suporte t\u00e9cnico.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">O objetivo \u00e9 tentar convencer a v\u00edtima a acessar sistemas comprometidos, fazer downloads, concluir transfer\u00eancias banc\u00e1rias ou fornecer informa\u00e7\u00f5es pessoais sens\u00edveis, como n\u00fameros de cart\u00e3o de cr\u00e9dito e senhas.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Um exemplo comum de vishing no Brasil \u00e9 o golpe da <\/span><strong><a href=\"https:\/\/www.instagram.com\/p\/C6OcqcnuVGt\">falsa central de banco<\/a><\/strong><span style=\"font-weight: 400;\"><strong>.<\/strong> Neste golpe, os criminosos entram em contato fingindo ser da central de atendimento de um banco e induzem a v\u00edtima a transferir dinheiro ou fornecer dados pessoais.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98b1584 elementor-widget elementor-widget-heading\" data-id=\"98b1584\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Smishing (SMS Phishing) <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e2b220 elementor-widget elementor-widget-text-editor\" data-id=\"5e2b220\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">O smishing usa mensagens de texto (SMS) para enganar as v\u00edtimas. Os criminosos enviam mensagens fraudulentas disfar\u00e7adas de ofertas ou alertas urgentes, como &#8220;Sua conta foi comprometida, clique aqui para recuperar&#8221;.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Essas mensagens geralmente incluem links maliciosos ou n\u00fameros de telefone falsificados, que podem inclusive ser iguais aos n\u00fameros oficiais de empresas conhecidas. Isso \u00e9 poss\u00edvel gra\u00e7as a uma t\u00e9cnica chamada de \u201cspoofing de telefone\u201d, que detalhamos <\/span><strong><a href=\"https:\/\/www.instagram.com\/p\/DBwWWt4uf5R\/\">neste post.<\/a><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea5701f elementor-widget elementor-widget-heading\" data-id=\"ea5701f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Phishing via redes sociais<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcff52d elementor-widget elementor-widget-text-editor\" data-id=\"dcff52d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Os ataques de phishing tamb\u00e9m acontecem nas redes sociais, onde os criminosos criam perfis falsos ou hackeiam contas existentes para se passar por amigos ou colegas. Um golpe comum \u00e9 quando os atacantes hackeiam uma conta leg\u00edtima e ent\u00e3o come\u00e7am a anunciar para os seguidores a venda de produtos ou servi\u00e7os falsos, que nunca ser\u00e3o entregues.<\/span><\/p><p><span style=\"font-weight: 400;\">Outra forma de phishing nas redes sociais \u00e9 por meio dos an\u00fancios pagos, promovidos pelas pr\u00f3prias plataformas. Embora elas adotem mecanismos para tentar bloquear an\u00fancios fraudulentos, alguns conseguem escapar do controle. O resultado s\u00e3o an\u00fancios que levam a sites falsos e lojas que n\u00e3o existem de verdade.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0de3af elementor-widget elementor-widget-heading\" data-id=\"a0de3af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">6. Business Email Compromise (BEC)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ac3fdf elementor-widget elementor-widget-text-editor\" data-id=\"0ac3fdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">O<strong><a href=\"https:\/\/hsclabs.com\/pt-br\/business-e-mail-compromise\/\"> BEC<\/a><\/strong> \u00e9 um tipo de phishing em que os atacantes se passam por executivos ou parceiros de neg\u00f3cios de alto n\u00edvel para enganar funcion\u00e1rios e realizar transa\u00e7\u00f5es financeiras fraudulentas. Muitas vezes, os atacantes conseguem acessar contas de e-mail comprometidas e enviar solicita\u00e7\u00f5es de pagamento ou outras a\u00e7\u00f5es que causam preju\u00edzos financeiros significativos.<\/span><\/p><p><span style=\"font-weight: 400;\">De todas as formas de phishing, o BEC \u00e9 o que tem maior impacto financeiro para as empresas. Segundo <strong><a href=\"https:\/\/www.ic3.gov\/PSA\/2024\/PSA240911\">dados do FBI,<\/a><\/strong> esse tipo de ataque j\u00e1 levou a perdas de mais de U$55 bilh\u00f5es na \u00faltima d\u00e9cada.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4d719d elementor-widget elementor-widget-heading\" data-id=\"f4d719d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">7. Angler Phishing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afabb3f elementor-widget elementor-widget-text-editor\" data-id=\"afabb3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Este tipo de phishing ocorre nas redes sociais e usa falsos perfis de suporte ao cliente. Os atacantes se passam por empresas leg\u00edtimas, respondendo a reclama\u00e7\u00f5es de usu\u00e1rios e, em seguida, tentando direcion\u00e1-los para sites de phishing ou coletar informa\u00e7\u00f5es pessoais sob o disfarce de &#8220;suporte ao cliente&#8221;.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e664e5f elementor-widget elementor-widget-heading\" data-id=\"e664e5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">8. Pharming<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee72234 elementor-widget elementor-widget-text-editor\" data-id=\"ee72234\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Embora n\u00e3o seja um tipo de phishing tradicional, o pharming redireciona as v\u00edtimas para sites falsificados, mesmo que elas digitem o endere\u00e7o correto na barra de navega\u00e7\u00e3o.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Isso \u00e9 feito atrav\u00e9s da modifica\u00e7\u00e3o do DNS (Sistema de Nomes de Dom\u00ednio) ou da instala\u00e7\u00e3o de malware no computador da v\u00edtima, permitindo que os criminosos capturem as credenciais de login e outras informa\u00e7\u00f5es.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea83235 elementor-widget elementor-widget-heading\" data-id=\"ea83235\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">9. Clone Phishing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c46bde elementor-widget elementor-widget-text-editor\" data-id=\"4c46bde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">No clone phishing, os atacantes copiam um e-mail leg\u00edtimo que a v\u00edtima j\u00e1 recebeu, alteram partes do conte\u00fado (como o link ou anexo) para torn\u00e1-lo malicioso, e reenviam esse e-mail para a v\u00edtima. Como o e-mail se parece com uma mensagem leg\u00edtima, a v\u00edtima pode ser enganada facilmente.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3e7aa4 elementor-widget elementor-widget-template\" data-id=\"f3e7aa4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"15243\" class=\"elementor elementor-15243\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section data-ha-partstyle=\"nasa\" data-ha-partcolor=\"\" data-ha-partopacity=\"0.4\" data-ha-partdirection=\"bottom\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6f97dd3 ha-particle-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default ha-particle-adv-no\" data-id=\"6f97dd3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-be74f27\" data-id=\"be74f27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b3233fa elementor-widget elementor-widget-heading\" data-id=\"b3233fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Ensine seus colaboradores a <b>reconhecer golpes e amea\u00e7as<\/b><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-541a906 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"541a906\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/hsclabs.com\/pt-br\/mindaware\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quero saber mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-49045f6\" data-id=\"49045f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51a2fe2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"51a2fe2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1272\" height=\"278\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/Logo-Mindaware-06.png\" class=\"attachment-full size-full wp-image-14663\" alt=\"\" srcset=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/Logo-Mindaware-06.png 1272w, https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/Logo-Mindaware-06-300x66.png 300w, https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/Logo-Mindaware-06-1024x224.png 1024w, https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/Logo-Mindaware-06-768x168.png 768w\" sizes=\"(max-width: 1272px) 100vw, 1272px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-beda341 elementor-widget elementor-widget-heading\" data-id=\"beda341\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O que muda nas amea\u00e7as de phishing em 2025?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c654ec6 elementor-widget elementor-widget-text-editor\" data-id=\"c654ec6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Basicamente, o que podemos esperar para o phishing em 2025 \u00e9 que ele se torne uma amea\u00e7a ainda mais sofisticada. Isso \u00e9 impulsionado principalmente por tecnologias emergentes, como intelig\u00eancia artificial e automatiza\u00e7\u00e3o.<\/span><\/p><p><span style=\"font-weight: 400;\">A revolu\u00e7\u00e3o trazida pela IA generativa, com destaque para o Chat GPT, impactou profundamente tamb\u00e9m o cen\u00e1rio de amea\u00e7as. Na pr\u00e1tica, os ataques de phishing evolu\u00edram de tentativas gen\u00e9ricas e mal formuladas para estrat\u00e9gias altamente personalizadas e convincentes.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Por consequ\u00eancia, <strong><a href=\"https:\/\/www.oblock.com.br\/como-identificar-ataques-de-phishing\/\">detectar phishing<\/a><\/strong> \u00e9 uma tarefa cada vez mais dif\u00edcil, tanto para usu\u00e1rios quanto para as ferramentas de seguran\u00e7a. Todo esse contexto levou a um aumento tamb\u00e9m no n\u00famero de ataques, complicando ainda mais o cen\u00e1rio.<\/span><\/p><p><span style=\"font-weight: 400;\">Abaixo, listamos alguns dos principais pontos de aten\u00e7\u00e3o para este ano.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfa4a71 elementor-widget elementor-widget-heading\" data-id=\"dfa4a71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ascens\u00e3o da intelig\u00eancia artificial <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3e959a elementor-widget elementor-widget-text-editor\" data-id=\"a3e959a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Como mencionamos, o uso de IA na cria\u00e7\u00e3o de e-mails e mensagens fraudulentas \u00e9 uma das principais mudan\u00e7as no phishing de 2025.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Ferramentas alimentadas por IA agora conseguem gerar e-mails personalizados, adaptando as mensagens de acordo com o comportamento e o hist\u00f3rico de intera\u00e7\u00f5es da v\u00edtima.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Em vez de utilizar apenas informa\u00e7\u00f5es b\u00e1sicas, como nome e cargo, os atacantes agora conseguem atuar de forma mais espec\u00edfica, replicando at\u00e9 mesmo o estilo de escrita das v\u00edtimas. Isso gera mensagens muito mais convincentes, com uma apar\u00eancia genu\u00edna, dificultando a distin\u00e7\u00e3o entre um e-mail leg\u00edtimo e um falso.<\/span><\/p><p><span style=\"font-weight: 400;\">Al\u00e9m disso, os chatbots baseados em IA est\u00e3o sendo empregados para enganar as v\u00edtimas em conversas em tempo real, como quando um cliente tenta acessar suporte t\u00e9cnico. Esses bots s\u00e3o programados para simular conversas naturais, tornando mais dif\u00edcil para os usu\u00e1rios perceberem que est\u00e3o interagindo com um programa malicioso, e n\u00e3o com uma pessoa real.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3aacffa elementor-widget elementor-widget-heading\" data-id=\"3aacffa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ataques em m\u00faltiplos canais <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a368e79 elementor-widget elementor-widget-text-editor\" data-id=\"a368e79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Os ataques n\u00e3o se limitam mais ao e-mail, e isso vai ficar ainda mais evidente em 2025.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Novas tecnologias tornaram mais f\u00e1cil para os criminosos atacarem em v\u00e1rios canais de comunica\u00e7\u00e3o, como mensagens de texto (smishing) e chamadas telef\u00f4nicas automatizadas (vishing). Esses ataques s\u00e3o cada vez mais integrados e coordenados, criando uma experi\u00eancia de ataque mais coesa e persistente.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">O smishing, por exemplo, envolve o envio de SMS fraudulentos com links maliciosos, frequentemente disfar\u00e7ados como alertas de seguran\u00e7a ou ofertas imperd\u00edveis. O objetivo \u00e9 incitar a v\u00edtima a clicar e comprometer suas informa\u00e7\u00f5es pessoais.<\/span><\/p><p><span style=\"font-weight: 400;\">O vishing, por outro lado, tem se tornado uma ferramenta popular para os atacantes, pois eles conseguem imitar com precis\u00e3o vozes e tons de voz humanos. Usando ferramentas avan\u00e7adas de deepfake e s\u00edntese de voz, os fraudadores podem criar chamadas telef\u00f4nicas que parecem vir de fontes confi\u00e1veis, como bancos, empresas ou at\u00e9 mesmo de executivos da empresa da v\u00edtima.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-019056c elementor-widget elementor-widget-heading\" data-id=\"019056c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Evolu\u00e7\u00e3o do Business Email Compromise (BEC)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a52df7 elementor-widget elementor-widget-text-editor\" data-id=\"4a52df7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">O <strong><a href=\"https:\/\/www.fbi.gov\/how-we-can-help-you\/scams-and-safety\/common-frauds-and-scams\/business-email-compromise\">BEC<\/a><\/strong>, que j\u00e1 era uma amea\u00e7a relevante, deve se intensificar em 2025. Como explicamos anteriormente, neste tipo de ataque o criminoso normalmente finge ser um diretor ou funcion\u00e1rio da empresa, e tenta enganar outros colaboradores para que eles realizem transa\u00e7\u00f5es fraudulentas &#8211; normalmente, transfer\u00eancias banc\u00e1rias.<\/span><\/p><p><span style=\"font-weight: 400;\">Com a ajuda de IA e a coleta de dados em redes sociais, os atacantes agora t\u00eam informa\u00e7\u00f5es detalhadas sobre os pap\u00e9is e responsabilidades das v\u00edtimas dentro da organiza\u00e7\u00e3o. Isso permite que eles se fa\u00e7am passar por executivos de alto escal\u00e3o, solicitando a\u00e7\u00f5es financeiras urgentes, como pagamentos para fornecedores.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">O uso de IA no BEC torna esses ataques ainda mais convincentes, adaptando-se rapidamente \u00e0s defesas e comportamentos da organiza\u00e7\u00e3o.<\/span><\/p><p><span style=\"font-weight: 400;\">Para se ter uma ideia, em 2024 uma empresa em Hong Kong<\/span><a href=\"https:\/\/www.cnnbrasil.com.br\/economia\/negocios\/golpistas-usam-deepfake-de-diretor-financeiro-e-roubam-us-25-milhoes\/\" target=\"_blank\" rel=\"noopener\"> <b>perdeu US$25 milh\u00f5es<\/b><\/a><span style=\"font-weight: 400;\"> devido a um golpe sofisticado utilizando tecnologia de\u00a0<\/span><b><a href=\"https:\/\/hsclabs.com\/pt-br\/deepfakes\/\" target=\"_blank\" rel=\"noopener\">deepfake<\/a><\/b><span style=\"font-weight: 400;\">. No ataque, criminosos replicaram a apar\u00eancia e a voz do diretor financeiro da empresa durante uma videoconfer\u00eancia falsa, e ent\u00e3o convenceram um funcion\u00e1rio a fazer a transfer\u00eancia.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74b8cf5 elementor-widget elementor-widget-heading\" data-id=\"74b8cf5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Integra\u00e7\u00e3o com redes sociais e ferramentas de colabora\u00e7\u00e3o<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74ad7a4 elementor-widget elementor-widget-text-editor\" data-id=\"74ad7a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Outro grande avan\u00e7o no phishing de 2025 \u00e9 o uso de redes sociais e plataformas de colabora\u00e7\u00e3o online como alvos.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Os atacantes agora est\u00e3o monitorando redes sociais e f\u00f3runs de discuss\u00e3o para entender os interesses e as conex\u00f5es de suas v\u00edtimas. Com essas informa\u00e7\u00f5es, eles podem criar campanhas de phishing mais eficazes, aproveitando a confian\u00e7a que as pessoas t\u00eam em seus c\u00edrculos sociais.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Al\u00e9m disso, com o aumento do uso de ferramentas como Slack, Teams e Zoom, as empresas est\u00e3o vendo novos tipos de ataques direcionados a essas plataformas. Os criminosos agora enviam convites falsificados para reuni\u00f5es ou mensagens com links maliciosos, tudo disfar\u00e7ado como uma intera\u00e7\u00e3o leg\u00edtima dentro do ambiente corporativo.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-158fe40 elementor-widget elementor-widget-heading\" data-id=\"158fe40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como se proteger contra phishing em 2025<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1095241 elementor-widget elementor-widget-text-editor\" data-id=\"1095241\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Com os ataques de phishing se tornando cada vez mais sofisticados, as empresas e indiv\u00edduos precisam adotar uma abordagem multifacetada para se proteger. Isso vai exigir um mix de educa\u00e7\u00e3o cont\u00ednua, tecnologia avan\u00e7ada e boas pr\u00e1ticas de seguran\u00e7a.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">A seguir, abordamos as principais estrat\u00e9gias para minimizar os riscos de ser v\u00edtima de um ataque de phishing.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c59ba20 elementor-widget elementor-widget-heading\" data-id=\"c59ba20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Treinamento cont\u00ednuo para equipes<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ed1aa8 elementor-widget elementor-widget-text-editor\" data-id=\"1ed1aa8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A principal linha de defesa contra o phishing \u00e9 a <strong><a href=\"https:\/\/hsclabs.com\/pt-br\/conscientizacao-em-ciberseguranca\/\">educa\u00e7\u00e3o dos usu\u00e1rios<\/a><\/strong>. Os ataques modernos s\u00e3o frequentemente projetados para explorar a psicologia humana e enganar at\u00e9 os colaboradores mais experientes. Portanto, \u00e9 importante que as empresas implementem <strong><a href=\"https:\/\/hsclabs.com\/pt-br\/solucao-conscientizacao-em-seguranca-da-informacao\/\">programas de treinamento<\/a><\/strong> cont\u00ednuo sobre seguran\u00e7a cibern\u00e9tica, com foco em como identificar tentativas de phishing.<\/span><\/p><p><span style=\"font-weight: 400;\">Esses treinamentos devem ser atualizados regularmente para refletir novas t\u00e9cnicas e incluir simula\u00e7\u00f5es de ataques reais, como testes de phishing. Isso ajuda os colaboradores a reconhecerem e-mails suspeitos, links fraudulentos e solicita\u00e7\u00f5es duvidosas.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Al\u00e9m disso, a cultura de conscientiza\u00e7\u00e3o deve ser promovida em todos os n\u00edveis da organiza\u00e7\u00e3o, garantindo que todos os funcion\u00e1rios compreendam as consequ\u00eancias de um ataque de phishing bem-sucedido. Uma ferramenta que auxilia nesse processo \u00e9 o MindAware, o software de conscientiza\u00e7\u00e3o em seguran\u00e7a da informa\u00e7\u00e3o da HSC Labs.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0deaaa0 elementor-widget elementor-widget-heading\" data-id=\"0deaaa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Implementa\u00e7\u00e3o de autentica\u00e7\u00e3o multifator (MFA)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cc1355 elementor-widget elementor-widget-text-editor\" data-id=\"2cc1355\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Uma das formas mais eficazes de proteger as contas e sistemas contra phishing (especialmente vindo de contas comprometidas) \u00e9 a autentica\u00e7\u00e3o multifatorial (MFA).\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Mesmo que um atacante consiga obter as credenciais de login de um funcion\u00e1rio, a MFA adiciona uma camada extra de seguran\u00e7a, exigindo algo mais do que apenas a senha para acessar os sistemas.<\/span><\/p><p><span style=\"font-weight: 400;\">A MFA pode envolver o uso de c\u00f3digos enviados por SMS, autentica\u00e7\u00e3o por aplicativos, ou biometria, como impress\u00f5es digitais ou reconhecimento facial. Ao implementar a MFA, as empresas tornam mais dif\u00edcil para os criminosos acessar contas, mesmo se eles tiverem informa\u00e7\u00f5es de login roubadas.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a01add elementor-widget elementor-widget-heading\" data-id=\"8a01add\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Uso de ferramentas de seguran\u00e7a baseadas em IA<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aaceb38 elementor-widget elementor-widget-text-editor\" data-id=\"aaceb38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Com o aumento da sofistica\u00e7\u00e3o dos ataques de phishing, as ferramentas tradicionais de seguran\u00e7a de e-mail podem n\u00e3o ser suficientes.<\/span><\/p><p><span style=\"font-weight: 400;\">Em 2025, \u00e9 essencial adotar solu\u00e7\u00f5es de seguran\u00e7a baseadas em IA que utilizam aprendizado de m\u00e1quina para analisar padr\u00f5es de e-mails e identificar amea\u00e7as em tempo real. Essas ferramentas podem detectar links maliciosos, anexos comprometidos e at\u00e9 mesmo sinais de phishing habilitado por IA.<\/span><\/p><p><span style=\"font-weight: 400;\">Solu\u00e7\u00f5es avan\u00e7adas, como o <strong><a href=\"https:\/\/hsclabs.com\/pt-br\/mailinspector\/\">MailInspector<\/a><\/strong>, s\u00e3o capazes de filtrar automaticamente e-mails suspeitos, verificar URLs e identificar e-mails que se passam por fontes confi\u00e1veis, mas que t\u00eam como objetivo roubar informa\u00e7\u00f5es confidenciais. Isso ajuda a reduzir a carga de trabalho dos colaboradores e a aumentar a efici\u00eancia das defesas contra phishing.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4db430 elementor-widget elementor-widget-heading\" data-id=\"f4db430\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Verifica\u00e7\u00e3o de URLs e anexos <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22e882d elementor-widget elementor-widget-text-editor\" data-id=\"22e882d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Como vimos, os ataques de phishing muitas vezes envolvem links maliciosos e anexos infectados. Mesmo que o e-mail pare\u00e7a leg\u00edtimo, a melhor pr\u00e1tica \u00e9 nunca clicar em links ou abrir anexos de fontes desconhecidas ou inesperadas.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Al\u00e9m disso, as empresas devem garantir que seus sistemas de seguran\u00e7a de e-mail verifiquem, automaticamente e em tempo real, as URLs e anexos de e-mails para detectar se eles s\u00e3o ou n\u00e3o maliciosos. Essa filtragem deve valer para o momento do clique, mesmo que a mensagem j\u00e1 tenha sido entregue.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad2defd elementor-widget elementor-widget-heading\" data-id=\"ad2defd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Implementa\u00e7\u00e3o de DMARC, DKIM e SPF<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b19b8d elementor-widget elementor-widget-text-editor\" data-id=\"9b19b8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A implementa\u00e7\u00e3o dos protocolos de <strong><a href=\"https:\/\/hsclabs.com\/pt-br\/dmarc\/\">DMARC<\/a><\/strong>, DKIM e SPF s\u00e3o pr\u00e1ticas essenciais para garantir que os e-mails enviados em nome da sua empresa sejam autenticados corretamente e n\u00e3o sejam usados por criminosos para se passar pela sua organiza\u00e7\u00e3o. Essas tecnologias ajudam a validar a identidade do remetente, garantindo que os e-mails n\u00e3o possam ser forjados.<\/span><\/p><p><span style=\"font-weight: 400;\">A configura\u00e7\u00e3o adequada de DMARC oferece a capacidade de monitorar e controlar como os e-mails enviados de seu dom\u00ednio s\u00e3o tratados pelas plataformas de e-mail, reduzindo a probabilidade de e-mails fraudulentos passarem despercebidos.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee0bd04 elementor-widget elementor-widget-heading\" data-id=\"ee0bd04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">6. Atualiza\u00e7\u00e3o de sistemas de seguran\u00e7a <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeab078 elementor-widget elementor-widget-text-editor\" data-id=\"aeab078\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Manter os sistemas e softwares de seguran\u00e7a atualizados \u00e9 fundamental para evitar que vulnerabilidades sejam exploradas em ataques de phishing.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">As atualiza\u00e7\u00f5es regulares dos firewalls, anti-malware, antiv\u00edrus e sistemas de e-mail garantem que os hackers n\u00e3o aproveitem falhas conhecidas para comprometer os sistemas.<\/span><\/p><p><span style=\"font-weight: 400;\">Em 2025, com o aumento das amea\u00e7as baseadas em IA, \u00e9 ainda mais importante que as empresas adotem solu\u00e7\u00f5es de seguran\u00e7a que possam ser atualizadas automaticamente para identificar novas formas de ataques de phishing.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d86e18e elementor-widget elementor-widget-heading\" data-id=\"d86e18e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">7. Monitoramento constante e resposta a incidentes<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ff40b6 elementor-widget elementor-widget-text-editor\" data-id=\"6ff40b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Apesar de todas as medidas preventivas, nenhum sistema \u00e9 100% \u00e0 prova de falhas. Por isso, \u00e9 fundamental que as empresas mantenham uma equipe de resposta a incidentes bem treinada para lidar rapidamente com quaisquer tentativas de phishing que possam passar pelas defesas iniciais.<\/span><\/p><p><span style=\"font-weight: 400;\">O monitoramento cont\u00ednuo da rede e dos sistemas de e-mail permite detectar sinais de ataques em andamento, como e-mails suspeitos ou atividades an\u00f4malas, e responder de maneira eficiente para minimizar os danos.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb6bc5d elementor-widget elementor-widget-heading\" data-id=\"eb6bc5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">8. Empoderamento dos usu\u00e1rios finais<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebb7718 elementor-widget elementor-widget-text-editor\" data-id=\"ebb7718\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Al\u00e9m da tecnologia, os <\/span><b>usu\u00e1rios finais<\/b><span style=\"font-weight: 400;\"> desempenham um papel fundamental na prote\u00e7\u00e3o contra phishing. A conscientiza\u00e7\u00e3o e o empoderamento dos colaboradores, fornecendo-lhes as ferramentas e informa\u00e7\u00f5es necess\u00e1rias para identificar ataques de phishing, s\u00e3o essenciais.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Isso inclui permitir que eles tenham acesso a ferramentas de autodefesa, como gerenciadores de senhas, e a capacidade de relatar e-mails suspeitos diretamente aos administradores de TI.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98df210 elementor-widget elementor-widget-heading\" data-id=\"98df210\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proteja sua empresa contra phishing com a HSC Labs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d0539f elementor-widget elementor-widget-text-editor\" data-id=\"6d0539f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Em 2025, a amea\u00e7a de phishing continua a evoluir, mas com proatividade, treinamento cont\u00ednuo e o uso de tecnologias avan\u00e7adas, as empresas podem se proteger de maneira eficaz.<\/span><\/p><p><span style=\"font-weight: 400;\">A HSC Labs est\u00e1 pronta para ajudar nessa miss\u00e3o, com uma abordagem integrada para combater phishing, com seguran\u00e7a de e-mail e conscientiza\u00e7\u00e3o de usu\u00e1rios. <strong><a href=\"https:\/\/hsclabs.com\/pt-br\/contato\/\">Fale com um especialista<\/a><\/strong> e saiba mais!<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ef82b11\" data-id=\"ef82b11\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58a29c0 elementor-widget elementor-widget-template\" data-id=\"58a29c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"11911\" class=\"elementor elementor-11911\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0e534a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f0e534a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a9b195e\" data-id=\"a9b195e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-861ae4f elementor-invisible elementor-widget elementor-widget-image\" data-id=\"861ae4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/hsc-global-cyber-alliance-parceria\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/11\/selo-proud-partner-gca-black.png\" title=\"selo-proud-partner-gca-black\" alt=\"selo-proud-partner-gca-black\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5b4e6f2 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"5b4e6f2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;slideInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4fb5e7e\" data-id=\"4fb5e7e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0008fa9 elementor-widget elementor-widget-heading\" data-id=\"0008fa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Inscreva-se para receber not\u00edcias de cybersecurity<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d77ffec elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"d77ffec\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Form Newsletter\" aria-label=\"Form Newsletter\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"11911\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"d77ffec\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Autentica\u00e7\u00e3o multifator: como funciona e por que \u00e9 essencial - HSC Labs\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"10831\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-xs  elementor-field-textual\" placeholder=\"Nome\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-xs  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-field_92fe65d elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_92fe65d\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCargo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[field_92fe65d]\" id=\"form-field-field_92fe65d\" class=\"elementor-field-textual elementor-size-xs\" required=\"required\">\n\t\t\t\t\t\t\t\t\t<option value=\"Especialista em Ciberseguran\u00e7a\">Especialista em Ciberseguran\u00e7a<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Analista de TI\">Analista de TI<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Gerente de TI\">Gerente de TI<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"CIO ou CISO\">CIO ou CISO<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"CTO\">CTO<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Desenvolvedor ou Arquiteto\">Desenvolvedor ou Arquiteto<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"CEO ou Diretor\">CEO ou Diretor<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de Compliance\">Profissional de Compliance<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional Jur\u00eddico\">Profissional Jur\u00eddico<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de Vendas \">Profissional de Vendas <\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de Marketing\">Profissional de Marketing<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de RH\">Profissional de RH<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Outro\">Outro<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_3197ff8 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_3197ff8\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCheck\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_3197ff8]\" id=\"form-field-field_3197ff8\" class=\"elementor-field elementor-size-xs  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_3197ff8\"><font size=\"1\"> Concordo com a <a href=\"https:\/\/hsclabs.com\/pt-br\/aviso-de-privacidade\/\">Pol\u00edtica de Privacidade<\/a> e dou o consentimento para o tratamento dos meus dados.<\/font><\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-xs elementor-animation-grow\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Enviar<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-410d8c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"410d8c8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;],&quot;sticky_offset&quot;:75,&quot;sticky_effects_offset&quot;:50,&quot;_ha_eqh_enable&quot;:false,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11f3a71\" data-id=\"11f3a71\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-01150fe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"01150fe\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-46c6b70\" data-id=\"46c6b70\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2c93e3 elementor-widget elementor-widget-heading\" data-id=\"f2c93e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Bloqueie ataques que passam despercebidos por Microsoft e Google<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b35ca5 elementor-widget elementor-widget-image\" data-id=\"7b35ca5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/protecao-para-microsoft-365\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/11\/Microsoft-365-color.png\" title=\"Microsoft-365-color\" alt=\"Microsoft-365-color\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef354be elementor-widget elementor-widget-image\" data-id=\"ef354be\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/protecao-para-google-workspace\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/11\/Google-workspace-color.png\" title=\"Google-workspace-color\" alt=\"Google-workspace-color\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d553f0d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d553f0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-628b068\" data-id=\"628b068\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-188fcee elementor-widget elementor-widget-spacer\" data-id=\"188fcee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d96b708 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d96b708\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-391d788\" data-id=\"391d788\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c855e45 elementor-widget elementor-widget-heading\" data-id=\"c855e45\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Treine a sua equipe em ciberseguran\u00e7a<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ef48b8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2ef48b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/hsclabs.com\/pt-br\/mindaware\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Comece Agora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing em 2025: o que mudou e como se proteger A tend\u00eancia para o phishing em 2025 \u00e9 que ele continue a ser uma das amea\u00e7as mais perigosas na ciberseguran\u00e7a, s\u00f3 que de forma ainda mais sofisticada. Com o avan\u00e7o de tecnologias como intelig\u00eancia artificial e deepfakes, os ataques de phishing est\u00e3o mais personalizados e [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16013,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-15977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing em 2025: o que mudou e como se proteger - HSC Labs<\/title>\n<meta name=\"description\" content=\"Entenda o que esperar para o cen\u00e1rio de phishing em 2025 e veja como proteger sua empresa contra essa amea\u00e7a.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing em 2025: o que mudou e como se proteger - HSC Labs\" \/>\n<meta property=\"og:description\" content=\"Entenda o que esperar para o cen\u00e1rio de phishing em 2025 e veja como proteger sua empresa contra essa amea\u00e7a.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"HSC Labs\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-08T14:06:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-27T13:07:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/01\/phishing-2025.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"HSC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"HSC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/\"},\"author\":{\"name\":\"HSC\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/aa3e38b2984d1b9331eb9cdcc5d11418\"},\"headline\":\"Phishing em 2025: o que mudou e como se proteger\",\"datePublished\":\"2025-01-08T14:06:26+00:00\",\"dateModified\":\"2025-05-27T13:07:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/\"},\"wordCount\":2816,\"publisher\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/phishing-2025.jpg\",\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/\",\"name\":\"Phishing em 2025: o que mudou e como se proteger - HSC Labs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/phishing-2025.jpg\",\"datePublished\":\"2025-01-08T14:06:26+00:00\",\"dateModified\":\"2025-05-27T13:07:31+00:00\",\"description\":\"Entenda o que esperar para o cen\u00e1rio de phishing em 2025 e veja como proteger sua empresa contra essa amea\u00e7a.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/phishing-2025.jpg\",\"contentUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/phishing-2025.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/phishing-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing em 2025: o que mudou e como se proteger\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/\",\"name\":\"HSC Cybersecurity\",\"description\":\"Full-scope cybersecurity solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#organization\",\"name\":\"HSC Cybersecurity\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cropped-Logo-HSC-01.png\",\"contentUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cropped-Logo-HSC-01.png\",\"width\":1496,\"height\":510,\"caption\":\"HSC Cybersecurity\"},\"image\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/high-security-center\\\/\",\"https:\\\/\\\/www.instagram.com\\\/hsclabs\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/aa3e38b2984d1b9331eb9cdcc5d11418\",\"name\":\"HSC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g\",\"caption\":\"HSC\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing em 2025: o que mudou e como se proteger - HSC Labs","description":"Entenda o que esperar para o cen\u00e1rio de phishing em 2025 e veja como proteger sua empresa contra essa amea\u00e7a.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/","og_locale":"pt_BR","og_type":"article","og_title":"Phishing em 2025: o que mudou e como se proteger - HSC Labs","og_description":"Entenda o que esperar para o cen\u00e1rio de phishing em 2025 e veja como proteger sua empresa contra essa amea\u00e7a.","og_url":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/","og_site_name":"HSC Labs","article_published_time":"2025-01-08T14:06:26+00:00","article_modified_time":"2025-05-27T13:07:31+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/01\/phishing-2025.jpg","type":"image\/jpeg"}],"author":"HSC","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"HSC","Est. tempo de leitura":"20 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/#article","isPartOf":{"@id":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/"},"author":{"name":"HSC","@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/person\/aa3e38b2984d1b9331eb9cdcc5d11418"},"headline":"Phishing em 2025: o que mudou e como se proteger","datePublished":"2025-01-08T14:06:26+00:00","dateModified":"2025-05-27T13:07:31+00:00","mainEntityOfPage":{"@id":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/"},"wordCount":2816,"publisher":{"@id":"https:\/\/hsclabs.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/01\/phishing-2025.jpg","inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/","url":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/","name":"Phishing em 2025: o que mudou e como se proteger - HSC Labs","isPartOf":{"@id":"https:\/\/hsclabs.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/#primaryimage"},"image":{"@id":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/01\/phishing-2025.jpg","datePublished":"2025-01-08T14:06:26+00:00","dateModified":"2025-05-27T13:07:31+00:00","description":"Entenda o que esperar para o cen\u00e1rio de phishing em 2025 e veja como proteger sua empresa contra essa amea\u00e7a.","breadcrumb":{"@id":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hsclabs.com\/pt-br\/phishing-2025\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/#primaryimage","url":"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/01\/phishing-2025.jpg","contentUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/01\/phishing-2025.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/hsclabs.com\/pt-br\/phishing-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hsclabs.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Phishing em 2025: o que mudou e como se proteger"}]},{"@type":"WebSite","@id":"https:\/\/hsclabs.com\/pt-br\/#website","url":"https:\/\/hsclabs.com\/pt-br\/","name":"HSC Cybersecurity","description":"Full-scope cybersecurity solutions","publisher":{"@id":"https:\/\/hsclabs.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hsclabs.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hsclabs.com\/pt-br\/#organization","name":"HSC Cybersecurity","url":"https:\/\/hsclabs.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/cropped-Logo-HSC-01.png","contentUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/cropped-Logo-HSC-01.png","width":1496,"height":510,"caption":"HSC Cybersecurity"},"image":{"@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/high-security-center\/","https:\/\/www.instagram.com\/hsclabs"]},{"@type":"Person","@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/person\/aa3e38b2984d1b9331eb9cdcc5d11418","name":"HSC","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g","caption":"HSC"}}]}},"_links":{"self":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts\/15977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/comments?post=15977"}],"version-history":[{"count":22,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts\/15977\/revisions"}],"predecessor-version":[{"id":16021,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts\/15977\/revisions\/16021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/media\/16013"}],"wp:attachment":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/media?parent=15977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/categories?post=15977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/tags?post=15977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}