{"id":5205,"date":"2025-06-30T06:16:43","date_gmt":"2025-06-30T06:16:43","guid":{"rendered":"https:\/\/buvei.com\/blog\/?p=5205"},"modified":"2025-06-30T06:16:43","modified_gmt":"2025-06-30T06:16:43","slug":"bec-scam-business-payment-security-3","status":"publish","type":"post","link":"https:\/\/buvei.com\/blog\/pt\/bec-scam-business-payment-security-3\/","title":{"rendered":"Guia Completo: Como Detectar e Evitar Golpes BEC em Pagamentos Empresariais"},"content":{"rendered":"<p data-start=\"572\" data-end=\"967\">Os golpes de comprometimento de e-mail corporativo (BEC - Business Email Compromise) est\u00e3o em crescimento acelerado \u2014 mais direcionados, sofisticados e dispendiosos do que nunca. Em 2023, o FBI registrou 21.489 den\u00fancias desse tipo de fraude, com perdas superiores a US$ 2,9 bilh\u00f5es. O que os torna t\u00e3o perigosos? Eles n\u00e3o envolvem malwares \u2014 apenas engenharia social baseada em confian\u00e7a falsa.<\/p>\n<h3 data-start=\"969\" data-end=\"993\">O que \u00e9 um golpe BEC?<\/h3>\n<p data-start=\"995\" data-end=\"1202\">BEC \u00e9 uma forma de fraude onde golpistas se fazem passar por algu\u00e9m de confian\u00e7a \u2014 como seu chefe, fornecedor ou advogado \u2014 via e-mail, para induzir transfer\u00eancias de dinheiro ou obten\u00e7\u00e3o de dados sens\u00edveis.<\/p>\n<p data-start=\"1204\" data-end=\"1431\">O que diferencia esse tipo de golpe <a href=\"https:\/\/buvei.com\/blog\/credit-card-fraud-prevention-2025\/\">de outras fraudes financeiras<\/a> \u00e9 o alto grau de personaliza\u00e7\u00e3o. As mensagens geralmente imitam comunica\u00e7\u00f5es reais, com refer\u00eancias a transa\u00e7\u00f5es leg\u00edtimas, nomes conhecidos ou eventos recentes.<\/p>\n<h3 data-start=\"3452\" data-end=\"3479\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-5208\" src=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2.jpg2_-2-300x170.jpg\" alt=\"\" width=\"300\" height=\"170\" srcset=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2.jpg2_-2-300x170.jpg 300w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2.jpg2_-2-1024x579.jpg 1024w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2.jpg2_-2-768x434.jpg 768w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2.jpg2_-2-400x226.jpg 400w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2.jpg2_-2-800x452.jpg 800w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2.jpg2_-2-832x470.jpg 832w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2.jpg2_-2-1248x705.jpg 1248w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2.jpg2_-2.jpg 1472w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/h3>\n<h3 data-start=\"1433\" data-end=\"1450\">Exemplos Reais<\/h3>\n<p data-start=\"1452\" data-end=\"1598\"><strong data-start=\"1452\" data-end=\"1480\">Golpe do cart\u00e3o-presente<\/strong>: criminosos imitaram e-mails de executivos e pediram que funcion\u00e1rios comprassem cart\u00f5es para \u201ceventos com clientes\u201d.<\/p>\n<p data-start=\"1600\" data-end=\"1755\"><strong data-start=\"1600\" data-end=\"1630\">Fraude em compra de im\u00f3vel<\/strong>: v\u00edtimas perderam US$ 160.000 ap\u00f3s transferirem para contas falsas, seguindo orienta\u00e7\u00f5es de um falso escrit\u00f3rio de cust\u00f3dia.<\/p>\n<p data-start=\"1757\" data-end=\"1910\"><strong data-start=\"1757\" data-end=\"1779\">Phishing Microsoft<\/strong>: kits de phishing miraram usu\u00e1rios do Office 365 para roubo de credenciais, at\u00e9 mesmo burlando autentica\u00e7\u00e3o em dois fatores (MFA).<\/p>\n<h3 data-start=\"1912\" data-end=\"1943\">T\u00e1ticas Comuns de Golpes BEC<\/h3>\n<div class=\"_tableContainer_16hzy_1\">\n<div class=\"_tableWrapper_16hzy_14 group flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" style=\"height: 214px;\" width=\"693\" data-start=\"1945\" data-end=\"2691\">\n<thead data-start=\"1945\" data-end=\"2037\">\n<tr data-start=\"1945\" data-end=\"2037\">\n<th data-start=\"1945\" data-end=\"1969\" data-col-size=\"sm\">Tipo de Golpe<\/th>\n<th data-start=\"1969\" data-end=\"2037\" data-col-size=\"md\">Descri\u00e7\u00e3o<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"2131\" data-end=\"2691\">\n<tr data-start=\"2131\" data-end=\"2223\">\n<td data-start=\"2131\" data-end=\"2155\" data-col-size=\"sm\">Fraude do CEO<\/td>\n<td data-col-size=\"md\" data-start=\"2155\" data-end=\"2223\">Finge ser executivo para solicitar transfer\u00eancias urgentes<\/td>\n<\/tr>\n<tr data-start=\"2224\" data-end=\"2316\">\n<td data-start=\"2224\" data-end=\"2248\" data-col-size=\"sm\">Faturas falsas<\/td>\n<td data-col-size=\"md\" data-start=\"2248\" data-end=\"2316\">Altera dados de boletos ou notas para redirecionar pagamentos<\/td>\n<\/tr>\n<tr data-start=\"2317\" data-end=\"2409\">\n<td data-start=\"2317\" data-end=\"2341\" data-col-size=\"sm\">Falso advogado<\/td>\n<td data-col-size=\"md\" data-start=\"2341\" data-end=\"2409\">Usa tom jur\u00eddico para explorar urg\u00eancia e confidencialidade<\/td>\n<\/tr>\n<tr data-start=\"2410\" data-end=\"2505\">\n<td data-start=\"2410\" data-end=\"2434\" data-col-size=\"sm\">Conta invadida<\/td>\n<td data-col-size=\"md\" data-start=\"2434\" data-end=\"2505\">Hackeia e-mail real e envia pedidos fraudulentos ap\u00f3s monitoramento<\/td>\n<\/tr>\n<tr data-start=\"2506\" data-end=\"2598\">\n<td data-start=\"2506\" data-end=\"2530\" data-col-size=\"sm\">Roubo de dados<\/td>\n<td data-col-size=\"md\" data-start=\"2530\" data-end=\"2598\">Solicita informa\u00e7\u00f5es confidenciais (folha de pagamento, CPF)<\/td>\n<\/tr>\n<tr data-start=\"2599\" data-end=\"2691\">\n<td data-start=\"2599\" data-end=\"2623\" data-col-size=\"sm\">Falso fornecedor<\/td>\n<td data-col-size=\"md\" data-start=\"2623\" data-end=\"2691\">Atualiza dados banc\u00e1rios para desviar pagamentos<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<h3 data-start=\"3452\" data-end=\"3479\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-5206\" src=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/What-Every-User-Should-Know-About-Credit-Card-Numbers4-2-300x169.webp\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/What-Every-User-Should-Know-About-Credit-Card-Numbers4-2-300x169.webp 300w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/What-Every-User-Should-Know-About-Credit-Card-Numbers4-2-768x432.webp 768w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/What-Every-User-Should-Know-About-Credit-Card-Numbers4-2-400x225.webp 400w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/What-Every-User-Should-Know-About-Credit-Card-Numbers4-2-800x450.webp 800w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/What-Every-User-Should-Know-About-Credit-Card-Numbers4-2-832x468.webp 832w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/What-Every-User-Should-Know-About-Credit-Card-Numbers4-2.webp 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/h3>\n<h3 data-start=\"2693\" data-end=\"2724\">Como Funcionam os Golpes BEC<\/h3>\n<ol data-start=\"2726\" data-end=\"3062\">\n<li data-start=\"2726\" data-end=\"2828\">\n<p data-start=\"2729\" data-end=\"2828\"><strong data-start=\"2729\" data-end=\"2747\">Reconhecimento<\/strong>: golpistas pesquisam informa\u00e7\u00f5es no LinkedIn, redes sociais, sites corporativos.<\/p>\n<\/li>\n<li data-start=\"2829\" data-end=\"2897\">\n<p data-start=\"2832\" data-end=\"2897\"><strong data-start=\"2832\" data-end=\"2844\">Imita\u00e7\u00e3o<\/strong>: clonam endere\u00e7os de e-mail ou invadem contas reais.<\/p>\n<\/li>\n<li data-start=\"2898\" data-end=\"2987\">\n<p data-start=\"2901\" data-end=\"2987\"><strong data-start=\"2901\" data-end=\"2913\">Execu\u00e7\u00e3o<\/strong>: enviam mensagens urgentes e cr\u00edveis solicitando transfer\u00eancias ou dados.<\/p>\n<\/li>\n<li data-start=\"2988\" data-end=\"3062\">\n<p data-start=\"2991\" data-end=\"3062\"><strong data-start=\"2991\" data-end=\"3011\">Fraude consumada<\/strong>: a v\u00edtima segue as instru\u00e7\u00f5es e o preju\u00edzo ocorre.<\/p>\n<\/li>\n<\/ol>\n<h3 data-start=\"3064\" data-end=\"3083\">Sinais de Alerta<\/h3>\n<ul data-start=\"3085\" data-end=\"3450\">\n<li data-start=\"3085\" data-end=\"3150\">\n<p data-start=\"3087\" data-end=\"3150\">Endere\u00e7o de e-mail com erro sutil (ex.: \u201c<a class=\"cursor-pointer\" rel=\"noopener\" data-start=\"3128\" data-end=\"3148\">joao@empresacorn.com<\/a>\u201d)<\/p>\n<\/li>\n<li data-start=\"3151\" data-end=\"3233\">\n<p data-start=\"3153\" data-end=\"3233\">Solicita\u00e7\u00e3o de pagamento incomum: cart\u00f5es-presente, cripto, contas desconhecidas<\/p>\n<\/li>\n<li data-start=\"3234\" data-end=\"3310\">\n<p data-start=\"3236\" data-end=\"3310\">Tom urgente e confidencial: \u201cN\u00e3o fale com ningu\u00e9m, precisamos disso agora\u201d<\/p>\n<\/li>\n<li data-start=\"3311\" data-end=\"3367\">\n<p data-start=\"3313\" data-end=\"3367\">Texto com erros ou frases estranhas, mesmo bem escrito<\/p>\n<\/li>\n<li data-start=\"3368\" data-end=\"3450\">\n<p data-start=\"3370\" data-end=\"3450\">E-mails de provedores gratuitos (@gmail, @yahoo) em vez de dom\u00ednios corporativos<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"3452\" data-end=\"3479\"><a href=\"https:\/\/buvei.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4756 size-large\" src=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-1024x307.png\" alt=\"\" width=\"1024\" height=\"307\" srcset=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-1024x307.png 1024w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-300x90.png 300w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-768x230.png 768w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-400x120.png 400w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-800x240.png 800w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-832x249.png 832w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-1248x374.png 1248w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3.png 1442w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/h3>\n<h3 data-start=\"3452\" data-end=\"3479\">Por que Isso \u00e9 Relevante<\/h3>\n<p data-start=\"3481\" data-end=\"3644\">Al\u00e9m das perdas financeiras (milhares ou milh\u00f5es de reais), os golpes BEC causam danos emocionais, roubo de identidade e impacto na reputa\u00e7\u00e3o e cr\u00e9dito da empresa.<\/p>\n<h3 data-start=\"3646\" data-end=\"3665\">Como se Proteger<\/h3>\n<ul data-start=\"3667\" data-end=\"4182\">\n<li data-start=\"3667\" data-end=\"3759\">\n<p data-start=\"3669\" data-end=\"3759\"><strong data-start=\"3669\" data-end=\"3703\">Verifique qualquer solicita\u00e7\u00e3o<\/strong>: use n\u00fameros conhecidos, nunca os informados no e-mail.<\/p>\n<\/li>\n<li data-start=\"3760\" data-end=\"3859\">\n<p data-start=\"3762\" data-end=\"3859\"><strong data-start=\"3762\" data-end=\"3784\">Proteja seu e-mail<\/strong>: senhas fortes, autentica\u00e7\u00e3o em dois fatores (MFA), filtros anti-phishing.<\/p>\n<\/li>\n<li data-start=\"3860\" data-end=\"3960\">\n<p data-start=\"3862\" data-end=\"3960\"><strong data-start=\"3862\" data-end=\"3891\">Evite exposi\u00e7\u00e3o excessiva<\/strong>: n\u00e3o divulgue online neg\u00f3cios em andamento ou opera\u00e7\u00f5es financeiras.<\/p>\n<\/li>\n<li data-start=\"3961\" data-end=\"4072\">\n<p data-start=\"3963\" data-end=\"4072\"><strong data-start=\"3963\" data-end=\"3991\">Tenha controles internos<\/strong>: valida\u00e7\u00f5es em duas etapas para pagamentos, confirma\u00e7\u00e3o direta com fornecedores.<\/p>\n<\/li>\n<li data-start=\"4073\" data-end=\"4182\">\n<p data-start=\"4075\" data-end=\"4182\"><strong data-start=\"4075\" data-end=\"4096\">Treine sua equipe<\/strong>: para identificar dom\u00ednios suspeitos, urg\u00eancias falsas e solicita\u00e7\u00f5es fora do padr\u00e3o.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"3452\" data-end=\"3479\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5207 size-large\" src=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2-1024x579.jpg\" alt=\"\" width=\"1024\" height=\"579\" srcset=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2-1024x579.jpg 1024w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2-300x170.jpg 300w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2-768x434.jpg 768w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2-400x226.jpg 400w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2-800x452.jpg 800w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2-832x470.jpg 832w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2-1248x705.jpg 1248w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/BEC-Scam-Explained-How-Scammers-Steal-Your-Info-What-You-Can-Do-1-2.jpg 1472w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/h3>\n<h3 data-start=\"4184\" data-end=\"4218\">Como os Cart\u00f5es Virtuais Ajudam<\/h3>\n<p data-start=\"4220\" data-end=\"4337\">Os cart\u00f5es virtuais da <a class=\"\" href=\"https:\/\/buvei.com\" target=\"_new\" rel=\"noopener\" data-start=\"4243\" data-end=\"4269\">Buvei<\/a> oferecem camadas extras de seguran\u00e7a para empresas e profissionais:<\/p>\n<ul data-start=\"4339\" data-end=\"4705\">\n<li data-start=\"4339\" data-end=\"4426\">\n<p data-start=\"4341\" data-end=\"4426\"><strong data-start=\"4341\" data-end=\"4365\">Cart\u00f5es de uso \u00fanico<\/strong>: s\u00e3o invalidados ap\u00f3s uma transa\u00e7\u00e3o, impedindo reutiliza\u00e7\u00e3o.<\/p>\n<\/li>\n<li data-start=\"4427\" data-end=\"4538\">\n<p data-start=\"4429\" data-end=\"4538\"><strong data-start=\"4429\" data-end=\"4467\">Cart\u00f5es bloqueados por comerciante<\/strong>: funcionam apenas no site autorizado, mesmo se os dados forem vazados.<\/p>\n<\/li>\n<li data-start=\"4539\" data-end=\"4620\">\n<p data-start=\"4541\" data-end=\"4620\"><strong data-start=\"4541\" data-end=\"4575\">Limites de gasto customiz\u00e1veis<\/strong>: reduz o impacto em caso de uso fraudulento.<\/p>\n<\/li>\n<li data-start=\"4621\" data-end=\"4705\">\n<p data-start=\"4623\" data-end=\"4705\"><strong data-start=\"4623\" data-end=\"4645\">Suspens\u00e3o imediata<\/strong>: qualquer cart\u00e3o pode ser pausado ou cancelado em segundos.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"4707\" data-end=\"4740\">Resumo para Usu\u00e1rios Buvei<\/h3>\n<ul data-start=\"4742\" data-end=\"5168\">\n<li data-start=\"4742\" data-end=\"4829\">\n<p data-start=\"4744\" data-end=\"4829\">Golpes BEC se aproveitam de urg\u00eancia e confian\u00e7a falsa para roubar dinheiro ou dados.<\/p>\n<\/li>\n<li data-start=\"4830\" data-end=\"4907\">\n<p data-start=\"4832\" data-end=\"4907\">Fique atento a detalhes do e-mail: dom\u00ednio, linguagem e forma de pagamento.<\/p>\n<\/li>\n<li data-start=\"4908\" data-end=\"4979\">\n<p data-start=\"4910\" data-end=\"4979\">Confirme todas solicita\u00e7\u00f5es importantes por telefone ou pessoalmente.<\/p>\n<\/li>\n<li data-start=\"4980\" data-end=\"5078\">\n<p data-start=\"4982\" data-end=\"5078\">Implemente boas pr\u00e1ticas: autentica\u00e7\u00e3o multifator, valida\u00e7\u00e3o de pagamentos, capacita\u00e7\u00e3o do time.<\/p>\n<\/li>\n<li data-start=\"5079\" data-end=\"5168\">\n<p data-start=\"5081\" data-end=\"5168\">Use os cart\u00f5es virtuais da Buvei para proteger seus dados financeiros e limitar riscos.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5170\" data-end=\"5288\">Quer aprender mais sobre como proteger seus fluxos de pagamento corporativos?<br data-start=\"5247\" data-end=\"5250\" \/>Acesse <a class=\"\" href=\"https:\/\/buvei.com\" target=\"_new\" rel=\"noopener\" data-start=\"5257\" data-end=\"5287\">Buvei.com<\/a>.<\/p>\n<p data-start=\"5170\" data-end=\"5288\"><a href=\"https:\/\/buvei.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4756 size-large\" src=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-1024x307.png\" alt=\"\" width=\"1024\" height=\"307\" srcset=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-1024x307.png 1024w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-300x90.png 300w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-768x230.png 768w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-400x120.png 400w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-800x240.png 800w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-832x249.png 832w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3-1248x374.png 1248w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/06\/Buvei-3.png 1442w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Os golpes de comprometimento de e-mail corporativo (BEC - Business Email Compromise) est\u00e3o em crescimento acelerado \u2014 mais&hellip;","protected":false},"author":2,"featured_media":5191,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_page_load_nextpost":""},"categories":[1382],"tags":[2519,2521,126,436,625],"class_list":{"0":"post-5205","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-case-studies-pt","8":"tag-bec-scam-pt","9":"tag-business-en-pt","10":"tag-buvei-pt","11":"tag-payment-en-pt","12":"tag-virtual-cards-pt","13":"cs-entry"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/posts\/5205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/comments?post=5205"}],"version-history":[{"count":0,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/posts\/5205\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/media\/5191"}],"wp:attachment":[{"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/media?parent=5205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/categories?post=5205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/tags?post=5205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}