We stop at nothing to fortify our clients’ defenses so they can stay secure in the face of any and all cyber threats.
Why monitoring monitors is the key to cyber threat resilience
Protect your organization by monitoring the monitors – a critical defense against cyber threats.
Diving into the new windows 11 PCA artifact
Discover the new forensic artifact in Windows 11 (22H2) and explore its format and behavior. Learn how to leverage it in investigations with our comprehensive documentation for DFIR practitioners.
12 Questions you should ask when choosing a Managed XDR
Discover the 12 essential questions to ask when selecting a managed XDR solution (MXDR). Make an informed choice for robust threat detection and response.
Guarding the Bridge: New Attack Vectors in Azure AD Connect
Sygnia’s research on Azure AD Connect revealed Attack Vectors in Azure, exposing credential and NT hash extraction, bypassing security.
Breaking Down the Casbaneiro Infection Chain – Part II
Since 2018, the Casbaneiro banking trojan has targeted Latin American financial sectors. Sygnia monitors it closely as a major threat to multi-regional financial organizations.
Case Study: cracking a global Adversary-In-The-Middle campaign using a threat intelligence toolkit
Using a variety of CTI enrichment techniques Sygnia was able to determine that the BEC attack was only a part of a much wider campaign, potentially impacting dozens of world-wide organizations.
Accelerating Cyber Investigations with Velocity XDR’s Integrated Behavioral Analytics
Sygnia’s Velocity XDR uses UEBA not only to form a baseline for detecting anomalies, but also make the internal data easily accessible to platform users.
Threat Actor Spotlight: RagnarLocker Ransomware
Explore the threat of RagnarLocker ransomware. Uncover its tactics and implications in this Sygnia blog spotlight on cyber threats.
The Downfall Of Dpapi Top Secret Weapon
Attackers exploit Windows DPAPI to steal data. Defenders can replace DPAPI backup key for full remediation.