Skip to content

    Why Monitoring Monitors Is the Key to Cyber Threat Resilience

    Protect your organization by monitoring the monitors – a critical defense against cyber threats. First published on spiceworks, November 6, 2023

    Read More

    Incident Response (4)

      Filter by Topic

      Incident Response

      Sygnia's Webinar on Actionable Incident Response Strategies for 2022

      TEL-AVIV, Israel and NEW YORK, January 25, 2022 – Sygnia, a leading incident response and cyber security consulting company that protects organizations worldwide, announces... Read More
      Featured Incident Response Threat Hunting

      End-to-End LOG4SHELL Hunting Strategy

      Log4j2 is a widely used open-source Java logging library developed by the Apache foundation. On December 9, 2021 a critical unauthenticated remote code execution... Read More
      Incident Response Threat Hunting

      Sygnia Advisory: Log4Shell Remote Code Execution

      Updated - December 17, 2021 On December 9, a critical remote code execution (RCE) vulnerability in Java logging library Apache Log4j was made public. The vulnerability,... Read More
      Incident Response


      TEL-AVIV, Israel and NEW YORK, December 8, 2021 – Sygnia, a leading cyber security consulting and incident response company that provides support to organizations worldwide,... Read More
      Incident Response Threat Hunting

      Recent Waves of Phishing Attacks Overpowering 2-factor Authentication

      Real-Time Authentication Phishing Kits implement a Man-in-the-Middle attack technique, allowing threat actors to obtain a live Office365 user session. Conditional Access... Read More
      Incident Response Threat Research Threat Hunting Ransomware

      Lazarus Group’s Mata Framework Leveraged To Deploy TFlower Ransomware

      Over the past few years, North Korea has turned its offensive cyber operations into a major source of income. On February 17, 2021, the US Department of Justice (DoJ) has... Read More