CONTACT US

We stop at nothing to fortify our clients’ defenses so they can stay secure in the face of any and all cyber threats.

Search by
10 October 2024

CrowdStrike Fallout: Navigating the Risks of Intrusive Security Tools

Learn how to balance robust cybersecurity with operational stability in the wake of the CrowdStrike outage.

22 August 2024

China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches

Sygnia uncovers the China-Nexus group ‘Velvet Ant’ leveraging a zero-day exploit (CVE-2024-20399) on Cisco Switch appliances, escalating evasion tactics to maintain long-term network persistence.

12 August 2024

What is a Rootkit? Exploring the Hidden Threats and Their Impact on System Security

Learn what Rootkits are, how sophisticated threat actors leverage them to gain full control of computers and systems, and how to protect your systems from this unique risk.

17 July 2024

The Return of Ghost Emperor’s Demodex

A Comprehensive Look at the Updated Infection Chain of Ghost Emperor’s Demodex Rootkit.

10 July 2024

Sygnia Recognized for the Third Consecutive Year in The Gartner 2024 Market Guide for Digital Forensics and Incident Response Retainer Services

In June, Sygnia, was named a Representative Vendor in the 2024 Gartner® Market Guide for Digital Forensics and Incident Response Retainer Services (DFIR).

1 July 2024

China-Nexus Threat Group ‘Velvet Ant’ Exploits Cisco Zero-Day (CVE-2024-20399) to Compromise Nexus Switch Devices – Advisory for Mitigation and Response

Learn about the forensic investigation by Sygnia, the cyber espionage operation by Velvet Ant, and best practices for safeguarding your network against sophisticated threats.

20 May 2024

Navigating the Digital Minefield

Part 1: A Thrilling Guide to Mastering Cyber Crisis Management.
Explore real-world cyber crises reimagined as high-stakes dramas, from WannaCry to Target’s breach.

15 May 2024

ESXi Ransomware Attacks: Evolution, Impact, and Defense Strategy

Understand how ransomware attacks unfold in virtualized environments, and how to defend against these attacks across each phase of the cyber-attack kill chain.

6 May 2024

Chapter 3 – Reversing DoSvc C++ using Ghidra – Part 1

In this chapter, we’ll finally get started on my favorite part: the reversing phase. Reversing is like looking for a needle in a haystack, so prepare yourselves, because things are about to get technical.