Skip to content

    Revealing Emperor Dragonfly: Night Sky and Cheerscrypt - A Single Ransomware Group

        Key Takeaways Sygnia recently investigated a Cheerscrypt ransomware attack which utilized Night Sky ransomware TTPs. Further analysis       revealed that Cheerscrypt and...

    Read More

    Blog Post

      Filter by Topic

      DPAPI Adversarial Security Red Team

      The Downfall Of Dpapi Top Secret Weapon

      TL;DR In recent years, the Windows DPAPI mechanism has been exploited by threat actors to extract secrets across an organization, using the immutable DPAPI domain backup key... Read More
      Threat Hunting Blog Post

      Incident Response in Google Cloud: Forensic Artifacts

      Key Takeaways Forensic data across Google Cloud can logically be organized into three categories: Identity Management, Google Workspace Apps, and Google Cloud Platform... Read More
      OT Security

      The Future of OT Security

      By Rafael Maman, VP OT Security Disclaimer: OT Security is a broad discipline, covering a wide range of industrial and operational domains: from manufacturing, through... Read More
      Incident Response Threat Hunting Blog Post

      Incident Response in Google Cloud: Foundations

      Key Takeaways Although Google Cloud is becoming more widely used, research and documentation surrounding incident response is limited, and for many aspects non-existent. ... Read More
      Featured Incident Response Threat Hunting

      Vice Society Ransomware Group: Threats to Health & Education Sector

      Read More
      Featured Incident Response Threat Hunting

      Vice Society TTPs: Insights from a Real-World Ransomware Investigation

      Key Takeaways Vice Society is a ransomware group that has been carrying out double extortion attacks for over a year. While continuing to wage attacks, the group remains... Read More