We stop at nothing to fortify our clients’ defenses so they can stay secure in the face of any and all cyber threats.
The Return of Ghost Emperor’s Demodex
A Comprehensive Look at the Updated Infection Chain of Ghost Emperor’s Demodex Rootkit.
Sygnia Recognized for the Third Consecutive Year in The Gartner 2024 Market Guide for Digital Forensics and Incident Response Retainer Services
In June, Sygnia, was named a Representative Vendor in the 2024 Gartner® Market Guide for Digital Forensics and Incident Response Retainer Services (DFIR).
Navigating the Digital Minefield
Part 1: A Thrilling Guide to Mastering Cyber Crisis Management.
Explore real-world cyber crises reimagined as high-stakes dramas, from WannaCry to Target’s breach.
ESXi Ransomware Attacks: Evolution, Impact, and Defense Strategy
Understand how ransomware attacks unfold in virtualized environments, and how to defend against these attacks across each phase of the cyber-attack kill chain.
Chapter 3 – Reversing DoSvc C++ using Ghidra – Part 1
In this chapter, we’ll finally get started on my favorite part: the reversing phase. Reversing is like looking for a needle in a haystack, so prepare yourselves, because things are about to get technical.
Securing Tomorrow: Lessons Learned and Future Challenges from ISTARI’S CHARTER 2024
Recently Sygnia’s CEO Ram Elboim participated as a panelist at the CHARTER event hosted by ISTARI in Singapore. The panel focused on cyber trends and future organizational threats. Learn more about Ram’s insights discussed in the event.
Chapter 2 – Black Box Research
The intricacies of WUDO (Windows Update Delivery Optimization).
Chapter 1 – Introduction
The intricacies of WUDO (Windows Update Delivery Optimization).
The Anatomy of a BlackCat (ALPHV) Attack
Explore the thwarted cyber extortion attempt by the BlackCat ransomware group, unraveled by Sygnia’s Incident Response team in 2023.