Skip to content

    Revealing Emperor Dragonfly: Night Sky and Cheerscrypt - A Single Ransomware Group

        Key Takeaways Sygnia recently investigated a Cheerscrypt ransomware attack which utilized Night Sky ransomware TTPs. Further analysis       revealed that Cheerscrypt and...

    Read More

    Incident Response (3)

      Filter by Topic

      Incident Response Threat Research Blog Post

      7 Cyber Attacks That Kept the Industry Talking in 2021

      As we start 2022, it’s time to take a good look back at the year we’re leaving behind us. At Sygnia, we’ve always been dedicated to the cyber security community, uncovering... Read More
      Incident Response

      Sygnia's Webinar on Actionable Incident Response Strategies for 2022

      TEL-AVIV, Israel and NEW YORK, January 25, 2022 – Sygnia, a leading incident response and cyber security consulting company that protects organizations worldwide, announces... Read More
      Featured Incident Response Threat Hunting

      End-to-End LOG4SHELL Hunting Strategy

      Log4j2 is a widely used open-source Java logging library developed by the Apache foundation. On December 9, 2021 a critical unauthenticated remote code execution... Read More
      Incident Response Threat Hunting

      Sygnia Advisory: Log4Shell Remote Code Execution

      Updated - December 17, 2021 On December 9, a critical remote code execution (RCE) vulnerability in Java logging library Apache Log4j was made public. The vulnerability,... Read More
      Incident Response

      SYGNIA RECOGNIZED AS MARKET GUIDE AND INCIDENT RESPONSE SERVICES

      TEL-AVIV, Israel and NEW YORK, December 8, 2021 – Sygnia, a leading cyber security consulting and incident response company that provides support to organizations worldwide,... Read More
      Incident Response Threat Hunting

      Recent Waves of Phishing Attacks Overpowering 2-factor Authentication

      Real-Time Authentication Phishing Kits implement a Man-in-the-Middle attack technique, allowing threat actors to obtain a live Office365 user session. Conditional Access... Read More