NEWSROOM
Browse the latest Sygnia news, media coverage, and brand resources.
Browse the latest Sygnia news, media coverage, and brand resources.
Press & Media Inquiries:
“GhostEmperor employs a multi-stage malware to achieve stealth execution and persistence and utilizes several methods to impede analysis process,” Security researcher Dor Nizar said.
After an extended period underground, the Chinese hackers have added a more sophisticated infection chain and additional EDR evasion techniques.
Attackers leveraged an updated version of the Demodex kernel-level rootkit with more advanced tools and obfuscation techniques to compromise an unnamed organization’s network.
An elusive and highly covert Chinese hacking group tracked as Ghost Emperor — notorious for its sophisticated supply-chain attacks targeting telecommunications and government entities in Southeast Asia — has been spotted for the first time in more than two years. And according to the researchers, the group has gotten even better at evading detection.
Zero-day was found granting unabated access to Chinese state-sponsored threat actors.
Cisco on Monday patched a zero-day vulnerability discovered months ago that allowed a China-nexus hacker to execute arbitrary commands as root on the compromised.
The moderate-severity vulnerability has been observed being exploited in the wild by Chinese APT Velvet Ant.
A newly patched zero-day vulnerability was exploited by Chinese state-backed hackers to compromise Cisco Nexus switches, researchers have revealed.
Cisco fixed an actively exploited NX-OS zero-day, the flaw was exploited to install previously unknown malware as root on vulnerable switches.
Sygnia is the foremost global cyber readiness and response team, applying creative approaches and battle-tested solutions to help organizations beat attackers and stay secure. We bring ingenuity to each phase of a company’s security journey, from assessment and preparedness to detection and response. At every step we meet our clients where they are and deliver the tailored insight and decisive action needed to be unstoppable in the face of cyber threats.