Skip to content

    Guarding the Bridge: New Attack Vectors in Azure AD Connect

    By researching Azure AD Connect components, Sygnia was able to discover several attack vectors for extracting Connector credentials and domain users’ NT hashes, while...

    Read More

    All Blog Posts

      Filter by Topic

      Incident Response Threat Research Blog Post

      7 Cyber Attacks That Kept the Industry Talking in 2021

      As we start 2022, it’s time to take a good look back at the year we’re leaving behind us. At Sygnia, we’ve always been dedicated to the cyber security community, uncovering... Read More
      Incident Response

      Sygnia's Webinar on Actionable Incident Response Strategies for 2022

      TEL-AVIV, Israel and NEW YORK, January 25, 2022 – Sygnia, a leading incident response and cyber security consulting company that protects organizations worldwide, announces... Read More
      Featured Threat Report Threat Research Videos

      Elephant Beetle: Uncovering an Organized Financial-Theft Operation

      For the past two years, Sygnia’s Incident Response (IR) team has been methodically tracking the Elephant Beetle threat group, an organized, significant financial-theft... Read More
      Adversary Security Blog Post

      It's a Threat Actor's Paradise: Getting Ahead of Attackers in 2022

      By David Warshavski, VP of Enterprise Security at Sygnia I recently joined world-renowned cyber security expert and Kaspersky CEO, Eugene Kaspersky, and PwC UK’s Cyber... Read More
      Featured Incident Response Threat Hunting

      End-to-End LOG4SHELL Hunting Strategy

      Log4j2 is a widely used open-source Java logging library developed by the Apache foundation. On December 9, 2021 a critical unauthenticated remote code execution... Read More
      Incident Response Threat Hunting

      Sygnia Advisory: Log4Shell Remote Code Execution

      Updated - December 17, 2021 On December 9, a critical remote code execution (RCE) vulnerability in Java logging library Apache Log4j was made public. The vulnerability,... Read More