Skip to content

    Revealing Emperor Dragonfly: Night Sky and Cheerscrypt - A Single Ransomware Group

        Key Takeaways Sygnia recently investigated a Cheerscrypt ransomware attack which utilized Night Sky ransomware TTPs. Further analysis       revealed that Cheerscrypt and...

    Read More

    Incident Response (4)

      Filter by Topic

      Incident Response

      SYGNIA RECOGNIZED AS MARKET GUIDE AND INCIDENT RESPONSE SERVICES

      TEL-AVIV, Israel and NEW YORK, December 8, 2021 – Sygnia, a leading cyber security consulting and incident response company that provides support to organizations worldwide,... Read More
      Incident Response Threat Hunting

      Recent Waves of Phishing Attacks Overpowering 2-factor Authentication

      Real-Time Authentication Phishing Kits implement a Man-in-the-Middle attack technique, allowing threat actors to obtain a live Office365 user session. Conditional Access... Read More
      Incident Response Threat Research Threat Hunting Ransomware

      Lazarus Group’s Mata Framework Leveraged To Deploy TFlower Ransomware

      Over the past few years, North Korea has turned its offensive cyber operations into a major source of income. On February 17, 2021, the US Department of Justice (DoJ) has... Read More
      Incident Response Threat Hunting Ransomware

      Kaseya Ransomware Supply Chain Attack

      On July 2nd, several managed service providers reported numerous ransomware incidents affecting their clients via Kaseya VSA – an endpoint monitoring and patch management... Read More
      Incident Response Threat Hunting Ransomware

      Detection And Hunting Of Golden SAML Attack

      The SolarWinds software supply chain attack is known to have affected U.S. government agencies, critical infrastructure entities, and private sector organizations by an... Read More
      Incident Response Threat Hunting

      Demystifying The PrintNightmare Vulnerability

      On June 28th, a critical remote code execution vulnerability was published, impacting Windows operating systems. The vulnerability allows threat actors who gained initial... Read More