Skip to content

    All Resources

    MXDR

    Accelerating Cyber Investigations with Velocity XDR's Integrated Behavioral Analytics

    Sygnia's Velocity XDR uses UEBA not only to form a baseline for detecting anomalies, but also make the internal data easily accessible to platform users. Read More
    Incident Response Threat Hunting

    Threat Actor Spotlight: RagnarLocker Ransomware

    The Windows DPAPI mechanism is exploited by attackers to extract data. Defenders can replace their DPAPI backup key to fully remediate their organization. Read More
    DPAPI Adversarial Security Red Team

    The Downfall Of Dpapi Top Secret Weapon

    The Windows DPAPI mechanism is exploited by attackers to extract data. Defenders can replace their DPAPI backup key to fully remediate their organization. Read More
    Threat Hunting Blog Post

    Incident Response in Google Cloud: Forensic Artifacts

    Incident Response in Google Cloud: Forensic Artifacts Read More
    OT Security

    The Future of OT Security

    Focusing primarily on the process manufacturing industry, this article unpacks the evolution and future of OT Security. Read More
    Incident Response Threat Hunting Blog Post

    Incident Response in Google Cloud: Foundations

    Incident response and threat hunting in Google Cloud Platform and Workspace Read More
    Featured Incident Response Threat Hunting

    Vice Society Ransomware Group: Threats to Health & Education Sector

    Professionals across all industries, agree that the Vice Society ransomware group is a major cyber threat, especially in health & education sector Read More
    Featured Incident Response Threat Hunting

    Vice Society TTPs: Insights from a Real-World Ransomware Investigation

    Get technical insights based on forensic investigations of Vice Society (ransomware group carrying out double extortion attacks) conducted by our IR team. Read More
    Featured Adversary Security Blog Post red team infrastructure

    Offensive CI/CD – A Cat on a Vessel

    Leveraging CI CD pipelines to automate implementation of evasion techniques in offensive tools - enacting adversary simulation tasks without detection. Read More
    Featured Incident Response Threat Hunting

    The Misconceptions of 2021's Black Swan Cyber Events

    Here are 3 common misconceptions about Black swan events that are considered incidents with high impact and low frequency that are impossible to predict. Read More
    Featured Incident Response Threat Hunting

    Hybrid Phishing Attack Vector – Complementing Phishing Campaigns

    Cyber-crime groups are targeting Java-based infrastructures susceptible to the Log4Shell vulnerability and are delivering Qakbot phishing emails Read More
    Featured Incident Response Threat Hunting

    Breaking Down the Casbaneiro Infection Chain

    The Casbaneiro banking trojan targets financial organizations to steal user data for financial gain. Get a detailed “attacker fingerprint”. Read More
    Incident Response Threat Research Blog Post

    7 Cyber Attacks That Kept the Industry Talking in 2021

    A journey back through 2021 - What we’ve learned from 5 major cyber attacks that took place in 2021 as well as 2 new threat actors identified by Sygnia. Read More
    Adversary Security Blog Post

    It's a Threat Actor's Paradise: Getting Ahead of Attackers in 2022

    Achieving cyber resilience in the hostile attack terrain comes down to an organization’s ability to flip the asymmetry between them and the threat actors. Read More
    Featured Incident Response Threat Hunting

    End-to-End LOG4SHELL Hunting Strategy

    Defenders, hunt for Log4Shell exploitation attempts, distinguish between failed and successful attempts and identify post-exploitation activities. Read More
    Incident Response Threat Hunting

    Recent Waves of Phishing Attacks Overpowering 2-factor Authentication

    Phishing attacks are still a leading attack vector for threat actors globally, & are evolving in prevalence & sophistication given work-from-home models Read More