CONTACT US

We stop at nothing to fortify our clients’ defenses so they can stay secure in the face of any and all cyber threats.

Search by
2 September 2022

Vice Society TTPs: Insights from a Real-World Ransomware Investigation

Get technical insights based on forensic investigations of Vice Society (ransomware group carrying out double extortion attacks) conducted by our IR team.

5 July 2022

Offensive CI/CD – A Cat on a Vessel

Leveraging CI CD pipelines to automate implementation of evasion techniques in offensive tools – enacting adversary simulation tasks without detection.

1 July 2022

Luna Moth: The Threat Actors Behind Recent False Subscription Scams

Sygnia’s team identified ‘Luna Moth’ ransom group. The threat actors resemble false subscription scammers, focusing on corporate data theft.

24 May 2022

Hybrid Phishing Attack Vector – Complementing Phishing Campaigns

Cyber-crime groups are targeting Java-based infrastructures susceptible to the Log4Shell vulnerability and are delivering Qakbot phishing emails

24 May 2022

The Misconceptions of 2021’s Black Swan Cyber Events

Here are 3 common misconceptions about Black swan events that are considered incidents with high impact and low frequency that are impossible to predict.

7 April 2022

Breaking Down the Casbaneiro Infection Chain

The Casbaneiro banking trojan targets financial organizations to steal user data for financial gain. Get a detailed “attacker fingerprint”.

7 February 2022

7 Cyber Attacks That Kept the Industry Talking in 2021

A journey back through 2021 – What we’ve learned from 5 major cyber attacks that took place in 2021 as well as 2 new threat actors identified by Sygnia.

29 December 2021

It’s a Threat Actor’s Paradise: Getting Ahead of Attackers in 2022

Achieving cyber resilience in the hostile attack terrain comes down to an organization’s ability to flip the asymmetry between them and the threat actors.

17 December 2021

End-to-End LOG4SHELL Hunting Strategy

Defenders, hunt for Log4Shell exploitation attempts, distinguish between failed and successful attempts and identify post-exploitation activities.