{"id":34880,"date":"2025-05-30T07:20:20","date_gmt":"2025-05-30T13:20:20","guid":{"rendered":"https:\/\/brakkeconsulting.com\/?p=34880"},"modified":"2025-05-30T07:20:20","modified_gmt":"2025-05-30T13:20:20","slug":"brakke-viewpoint-may-30-2025","status":"publish","type":"post","link":"https:\/\/brakkeconsulting.com\/pt\/brakke-viewpoint-may-30-2025\/","title":{"rendered":"Mirante de Brakke, 30 de maio de 2025"},"content":{"rendered":"<p>Sa\u00fade e Nutri\u00e7\u00e3o Animal, embora um pouco conservadora, \u00e9 um ref\u00fagio do tumulto do mundo tecnol\u00f3gico e cibern\u00e9tico, certo?<\/p>\n<p>Errado.<\/p>\n<p>J\u00e1 ouviu falar do Venom Spider? N\u00e3o estou falando de entomologia. O Venom Spider \u00e9 um grupo de phishing especializado em engenharia social. Eles coletam dados confidenciais sobre organiza\u00e7\u00f5es para atac\u00e1-las financeiramente, organizacionalmente e estrategicamente. &quot;Os ataques envolvem o uso de e-mail, telefone ou mensagens de texto que parecem leg\u00edtimas e fazem com que destinat\u00e1rios desavisados caiam no golpe e coloquem informa\u00e7\u00f5es privadas em risco&quot;, afirma. <a href=\"https:\/\/www.shrm.org\/topics-tools\/news\/talent-acquisition\/cybercriminals-use-malware-laced-fake-resumes-to-target-recruiters?\">SHRM<\/a>. Isso n\u00e3o \u00e9 pouca coisa.<\/p>\n<p>O alvo mais recente? Departamentos de RH e gerentes de contrata\u00e7\u00e3o. Aos poucos, eles entram no ERP da empresa anfitri\u00e3. A Arctic Wolf Labs, uma empresa de seguran\u00e7a cibern\u00e9tica, observou: &quot;Os recrutadores e gerentes de contrata\u00e7\u00e3o que trabalham em departamentos de RH s\u00e3o frequentemente considerados o ponto fraco de uma organiza\u00e7\u00e3o pelos invasores.&quot;<\/p>\n<p>Se voc\u00ea trabalha em uma organiza\u00e7\u00e3o maior, pode ter recebido treinamento em seguran\u00e7a cibern\u00e9tica. Caso contr\u00e1rio, o bom senso deve prevalecer. Cuidado com anexos de fontes desconhecidas ou com t\u00edtulos suspeitos. Verifique o endere\u00e7o de e-mail do remetente antes de abrir o anexo. Procure-o em um mecanismo de busca antes de prosseguir.<\/p>\n<p>Temos a sorte de desfrutar de um setor amig\u00e1vel e intimista. Mesmo assim, \u00e9 sempre bom estar atento.<\/p>\n<p><em>Jeff Santosuosso<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>A Animal Health and Nutrition, embora um pouco conservadora, \u00e9 um ref\u00fagio do tumulto do mundo tecnol\u00f3gico e cibern\u00e9tico, certo? Errado. Voc\u00ea j\u00e1 ouviu falar do Venom Spider? N\u00e3o estou falando de entomologia. O Venom Spider \u00e9 um grupo de phishing especializado em engenharia social. Eles coletam dados confidenciais sobre organiza\u00e7\u00f5es para atac\u00e1-las financeiramente, organizacionalmente e estrategicamente. &quot;Os ataques envolvem o uso de e-mail, telefone ou mensagens de texto que parecem leg\u00edtimas e fazem com que destinat\u00e1rios desavisados caiam no golpe e coloquem informa\u00e7\u00f5es privadas em risco&quot;, afirma a SHRM. Isso n\u00e3o \u00e9 pouca coisa. Seu alvo mais recente? Departamentos de RH e gerentes de contrata\u00e7\u00e3o. Aos poucos, eles entram no ERP do host. A Arctic Wolf Labs, uma empresa de seguran\u00e7a cibern\u00e9tica, observou: &quot;Os recrutadores e gerentes de contrata\u00e7\u00e3o que trabalham em departamentos de RH s\u00e3o frequentemente considerados o ponto fraco de uma organiza\u00e7\u00e3o pelos invasores&quot;. Se voc\u00ea trabalha em uma organiza\u00e7\u00e3o maior, pode ter recebido treinamento em seguran\u00e7a cibern\u00e9tica. Caso contr\u00e1rio, o bom senso deve prevalecer. Cuidado com anexos de fontes desconhecidas ou com t\u00edtulos suspeitos. Verifique o endere\u00e7o de e-mail do remetente antes de abrir o anexo. Procure-o em um mecanismo de busca antes de prosseguir. Temos a sorte de desfrutar de um ambiente amig\u00e1vel e \u00edntimo. Mesmo assim, \u00e9 sempre bom estar atento. Jeff Santosuosso<\/p>","protected":false},"author":19,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[43],"tags":[],"class_list":["post-34880","post","type-post","status-publish","format-standard","hentry","category-viewpoints"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>News from Brakke Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/brakkeconsulting.com\/pt\/brakke-viewpoint-may-30-2025\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"News from Brakke Consulting\" \/>\n<meta property=\"og:description\" content=\"Animal Health and Nutrition, though a bit conservative, is a refuge from the tumult of the tech and cyber world, right? Wrong. Have you heard of Venom Spider? I\u2019m not talking entomology. Venom Spider is a phishing group specializing in social engineering. They cull sensitive data about organizations to attack them financially, organizationally, and strategically. \u201cThe attacks involve the use of email, telephone, or text messages that look legitimate and cause unsuspecting recipients to fall for the scam and put private information at risk,\u201d offers SHRM. This is no small thing. Their latest target? HR departments and hiring managers. Bit by bit, they enter the host\u2019s ERP. Arctic Wolf Labs, a cybersecurity firm noted, \u201cThe recruiters and hiring managers who work in HR departments are often considered to be the weak point in an organization by attackers.\u201d If you\u2019re in a larger organization, you may have received cybersecurity training. If not, common sense should prevail. Beware of attachments from unknown sources or those with suspicious titles. Check the sender\u2019s email address before opening the attachment. Look them up via a search engine before proceeding. We\u2019re fortunate to enjoy a friendly, intimate industry. Still, vigilance is always appropriate. Jeff Santosuosso\" \/>\n<meta property=\"og:url\" content=\"https:\/\/brakkeconsulting.com\/pt\/brakke-viewpoint-may-30-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Brakke Consulting Website\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-30T13:20:20+00:00\" \/>\n<meta name=\"author\" content=\"Amanda McDavid\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amanda McDavid\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/\"},\"author\":{\"name\":\"Amanda McDavid\",\"@id\":\"https:\/\/brakkeconsulting.com\/#\/schema\/person\/cbd3330707aa1f20925a2f9d78722615\"},\"headline\":\"Brakke Viewpoint May 30, 2025\",\"datePublished\":\"2025-05-30T13:20:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/\"},\"wordCount\":207,\"articleSection\":[\"Viewpoints\"],\"inLanguage\":\"pt-PT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/\",\"url\":\"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/\",\"name\":\"News from Brakke Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/brakkeconsulting.com\/#website\"},\"datePublished\":\"2025-05-30T13:20:20+00:00\",\"author\":{\"@id\":\"https:\/\/brakkeconsulting.com\/#\/schema\/person\/cbd3330707aa1f20925a2f9d78722615\"},\"breadcrumb\":{\"@id\":\"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/brakkeconsulting.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brakke Viewpoint May 30, 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/brakkeconsulting.com\/#website\",\"url\":\"https:\/\/brakkeconsulting.com\/\",\"name\":\"Brakke Consulting Website\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/brakkeconsulting.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/brakkeconsulting.com\/#\/schema\/person\/cbd3330707aa1f20925a2f9d78722615\",\"name\":\"Amanda McDavid\",\"url\":\"https:\/\/brakkeconsulting.com\/pt\/author\/amanda\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Not\u00edcias da Brakke Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/brakkeconsulting.com\/pt\/brakke-viewpoint-may-30-2025\/","og_locale":"pt_PT","og_type":"article","og_title":"News from Brakke Consulting","og_description":"Animal Health and Nutrition, though a bit conservative, is a refuge from the tumult of the tech and cyber world, right? Wrong. Have you heard of Venom Spider? I\u2019m not talking entomology. Venom Spider is a phishing group specializing in social engineering. They cull sensitive data about organizations to attack them financially, organizationally, and strategically. \u201cThe attacks involve the use of email, telephone, or text messages that look legitimate and cause unsuspecting recipients to fall for the scam and put private information at risk,\u201d offers SHRM. This is no small thing. Their latest target? HR departments and hiring managers. Bit by bit, they enter the host\u2019s ERP. Arctic Wolf Labs, a cybersecurity firm noted, \u201cThe recruiters and hiring managers who work in HR departments are often considered to be the weak point in an organization by attackers.\u201d If you\u2019re in a larger organization, you may have received cybersecurity training. If not, common sense should prevail. Beware of attachments from unknown sources or those with suspicious titles. Check the sender\u2019s email address before opening the attachment. Look them up via a search engine before proceeding. We\u2019re fortunate to enjoy a friendly, intimate industry. Still, vigilance is always appropriate. Jeff Santosuosso","og_url":"https:\/\/brakkeconsulting.com\/pt\/brakke-viewpoint-may-30-2025\/","og_site_name":"Brakke Consulting Website","article_published_time":"2025-05-30T13:20:20+00:00","author":"Amanda McDavid","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Amanda McDavid","Tempo estimado de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/#article","isPartOf":{"@id":"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/"},"author":{"name":"Amanda McDavid","@id":"https:\/\/brakkeconsulting.com\/#\/schema\/person\/cbd3330707aa1f20925a2f9d78722615"},"headline":"Brakke Viewpoint May 30, 2025","datePublished":"2025-05-30T13:20:20+00:00","mainEntityOfPage":{"@id":"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/"},"wordCount":207,"articleSection":["Viewpoints"],"inLanguage":"pt-PT"},{"@type":"WebPage","@id":"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/","url":"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/","name":"Not\u00edcias da Brakke Consulting","isPartOf":{"@id":"https:\/\/brakkeconsulting.com\/#website"},"datePublished":"2025-05-30T13:20:20+00:00","author":{"@id":"https:\/\/brakkeconsulting.com\/#\/schema\/person\/cbd3330707aa1f20925a2f9d78722615"},"breadcrumb":{"@id":"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/brakkeconsulting.com\/zh\/brakke-viewpoint-may-30-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/brakkeconsulting.com\/"},{"@type":"ListItem","position":2,"name":"Brakke Viewpoint May 30, 2025"}]},{"@type":"WebSite","@id":"https:\/\/brakkeconsulting.com\/#website","url":"https:\/\/brakkeconsulting.com\/","name":"Site da Brakke Consulting","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/brakkeconsulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Person","@id":"https:\/\/brakkeconsulting.com\/#\/schema\/person\/cbd3330707aa1f20925a2f9d78722615","name":"Amanda McDavid","url":"https:\/\/brakkeconsulting.com\/pt\/author\/amanda\/"}]}},"_links":{"self":[{"href":"https:\/\/brakkeconsulting.com\/pt\/wp-json\/wp\/v2\/posts\/34880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/brakkeconsulting.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/brakkeconsulting.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/brakkeconsulting.com\/pt\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/brakkeconsulting.com\/pt\/wp-json\/wp\/v2\/comments?post=34880"}],"version-history":[{"count":1,"href":"https:\/\/brakkeconsulting.com\/pt\/wp-json\/wp\/v2\/posts\/34880\/revisions"}],"predecessor-version":[{"id":34882,"href":"https:\/\/brakkeconsulting.com\/pt\/wp-json\/wp\/v2\/posts\/34880\/revisions\/34882"}],"wp:attachment":[{"href":"https:\/\/brakkeconsulting.com\/pt\/wp-json\/wp\/v2\/media?parent=34880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/brakkeconsulting.com\/pt\/wp-json\/wp\/v2\/categories?post=34880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/brakkeconsulting.com\/pt\/wp-json\/wp\/v2\/tags?post=34880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}