We stop at nothing to fortify our clients’ defenses so they can stay secure in the face of any and all cyber threats.
Guarding the Bridge: New Attack Vectors in Azure AD Connect
Sygnia’s research on Azure AD Connect revealed Attack Vectors in Azure, exposing credential and NT hash extraction, bypassing security.
Breaking Down the Casbaneiro Infection Chain – Part II
Since 2018, the Casbaneiro banking trojan has targeted Latin American financial sectors. Sygnia monitors it closely as a major threat to multi-regional financial organizations.
Case Study: cracking a global Adversary-In-The-Middle campaign using a threat intelligence toolkit
Using a variety of CTI enrichment techniques Sygnia was able to determine that the BEC attack was only a part of a much wider campaign, potentially impacting dozens of world-wide organizations.
Accelerating Cyber Investigations with Velocity XDR’s Integrated Behavioral Analytics
Sygnia’s Velocity XDR uses UEBA not only to form a baseline for detecting anomalies, but also make the internal data easily accessible to platform users.
Threat Actor Spotlight: RagnarLocker Ransomware
Explore the threat of RagnarLocker ransomware. Uncover its tactics and implications in this Sygnia blog spotlight on cyber threats.
The Downfall Of Dpapi Top Secret Weapon
Attackers exploit Windows DPAPI to steal data. Defenders can replace DPAPI backup key for full remediation.
Incident Response in Google Cloud: Forensic Artifacts
Discover effective incident response in Google Cloud. Learn how to analyze forensic artifacts for swift resolution. Expert insights on Sygnia blog.
The Future of OT Security
Focusing primarily on the process manufacturing industry, this article unpacks the evolution and future of OT Security.
Incident Response in Google Cloud: Foundations
Incident response and threat hunting in Google Cloud Platform and Workspace