Skip to content

    Offensive CI/CD – A Cat on a Vessel

    TL;DR- How we leveraged CI/CD pipelines to solve the challenge of automating the streamline of evasion techniques into existing tools and deploy them in the field to enact...

    Read More

    Blog Post

      Filter by Topic

      Featured Incident Response Threat Hunting

      The Misconceptions of 2021's Black Swan Cyber Events

      First published on Dark Reading, Apr 14 Organizations can defend themselves from future unknows attacks by implementing targeted security hardening measures, turning on... Read More
      Featured Incident Response Threat Hunting

      Hybrid Phishing Attack Vector – Complementing Phishing Campaigns with Wide Infrastructure Exploitations

      Key Takeaways Read More
      Featured Incident Response Threat Hunting

      Breaking Down the Casbaneiro Infection Chain

      Background In 2018, the Casbaneiro banking Trojan (also referred to as Metamorfo) surfaced in mass MalSpam campaigns targeting Latin America. The primary objective, based on... Read More
      Incident Response Threat Research Blog Post

      7 Cyber Attacks That Kept the Industry Talking in 2021

      As we start 2022, it’s time to take a good look back at the year we’re leaving behind us. At Sygnia, we’ve always been dedicated to the cyber security community, uncovering... Read More
      Adversary Security Blog Post

      It's a Threat Actor's Paradise: Getting Ahead of Attackers in 2022

      By David Warshavski, VP of Enterprise Security at Sygnia I recently joined world-renowned cyber security expert and Kaspersky CEO, Eugene Kaspersky, and PwC UK’s Cyber... Read More
      Featured Incident Response Threat Hunting

      End-to-End LOG4SHELL Hunting Strategy

      Log4j2 is a widely used open-source Java logging library developed by the Apache foundation. On December 9, 2021 a critical unauthenticated remote code execution... Read More