We stop at nothing to fortify our clients’ defenses so they can stay secure in the face of any and all cyber threats.
The Anatomy of a BlackCat (ALPHV) Attack
Explore the thwarted cyber extortion attempt by the BlackCat ransomware group, unraveled by Sygnia’s Incident Response team in mid-2023.
Proof of Concept: Overcoming Google Cloud Incident Response Issues with ‘Cirrus’
How the Cirrus tool developed by Sygnia assists in evidence collection & investigation, while uncovering key log analysis & incident response strategies for Google Cloud.
Announcing ‘Cirrus’ – New Opensource Tool to Combat Google Cloud Incident Response Challenges
New open-source tool streamlines incident response in Google Workspace & GCP. Overcome challenges, access data, & gain insights faster. Learn more about Cirrus & Google Cloud forensics in our blog series.
The SEC’s SolarWinds investigation in Context: Lessons from 100 Enterprise Security Assessments Governance & Compliance
SEC charges SolarWinds & CISO with misleading statements about security practices. Learn how SolarWinds compares to other companies & what you can do to improve your security posture.
Sygnia Annual Field Report
From relentless adversaries to resilient businesses, the Sygnia Annual Field Report offers unique insights and strategic guidance to strengthen your cybersecurity defenses against the ever-evolving threat landscape.
Crypto Cyber Security
Sygnia has developed a deep understanding of how crypto attacks unfold and the threat-actor tactics that are typically used.
Why monitoring monitors is the key to cyber threat resilience
Protect your organization by monitoring the monitors – a critical defense against cyber threats.
12 Questions you should ask when choosing a Managed XDR
Discover the 12 essential questions to ask when selecting a managed XDR solution (MXDR). Make an informed choice for robust threat detection and response.
Guarding the Bridge: New Attack Vectors in Azure AD Connect
Sygnia’s research on Azure AD Connect revealed Attack Vectors in Azure, exposing credential and NT hash extraction, bypassing security.