David Brunsdon

Using Generative AI to Understand How an Obfuscated Script Works

Tackling Code Obfuscation When facing a new technical challenge, I’m someone who often feels "in...

Read More arrow_right_alt
HYAS Threat Intel Report March 25 2024

Weekly Threat Intelligence Report Date: March 25, 2024 Prepared by: David Brunsdon, Threat...

Read More arrow_right_alt
OT, Not IoT: The Foundation of Network Security

Operational technology (OT) is critical infrastructure that enables IT networks to function. OT...

Read More arrow_right_alt
Examining Predator Mercenary Spyware

HYAS Labs, the R&D arm of HYAS, has been following the research by CitizenLab and Sekoia on the...

Read More arrow_right_alt
Stopping Cyber Attacks Against the Financial Sector: Four Use Cases

The financial sector is a prime target for cyber attacks. Financial organizations and their...

Read More arrow_right_alt
OT vs. IT: Equally Critical but Critically Different

While traditional information technology (IT) networks enjoy a seat at the table (and a budget) at...

Read More arrow_right_alt
Detecting and Blocking DNS Tunneling in OT Environments

In previous posts, we have discussed how most malware must employ the domain name system (DNS) at...

Read More arrow_right_alt