Proof of Concept: Overcoming Google Cloud Incident Response Issues with ‘Cirrus’
How the Cirrus tool developed by Sygnia assists in evidence collection & investigation, while uncovering key log analysis & incident response strategies for Google Cloud.
The SEC’s SolarWinds investigation in Context: Lessons from 100 Enterprise Security Assessments Governance & Compliance
SEC charges SolarWinds & CISO with misleading statements about security practices. Learn how SolarWinds compares to other companies & what you can do to improve your security posture.
Crypto Cyber Security
Sygnia has developed a deep understanding of how crypto attacks unfold and the threat-actor tactics that are typically used.
Why monitoring monitors is the key to cyber threat resilience
Protect your organization by monitoring the monitors – a critical defense against cyber threats.
Diving into the new windows 11 PCA artifact
Discover the new forensic artifact in Windows 11 (22H2) and explore its format and behavior. Learn how to leverage it in investigations with our comprehensive documentation for DFIR practitioners.
12 Questions you should ask when choosing a Managed XDR
Discover the 12 essential questions to ask when selecting a managed XDR solution (MXDR). Make an informed choice for robust threat detection and response.
Guarding the Bridge: New Attack Vectors in Azure AD Connect
Sygnia’s research on Azure AD Connect revealed Attack Vectors in Azure, exposing credential and NT hash extraction, bypassing security.
Breaking Down the Casbaneiro Infection Chain – Part II
Since 2018, the Casbaneiro banking trojan has targeted Latin American financial sectors. Sygnia monitors it closely as a major threat to multi-regional financial organizations.
Case Study: cracking a global Adversary-In-The-Middle campaign using a threat intelligence toolkit
Using a variety of CTI enrichment techniques Sygnia was able to determine that the BEC attack was only a part of a much wider campaign, potentially impacting dozens of world-wide organizations.