David Brunsdon
Using Generative AI to Understand How an Obfuscated Script Works
Tackling Code Obfuscation When facing a new technical challenge, I’m someone who often feels "in...
HYAS Threat Intel Report March 25 2024
Weekly Threat Intelligence Report Date: March 25, 2024 Prepared by: David Brunsdon, Threat...
OT, Not IoT: The Foundation of Network Security
Operational technology (OT) is critical infrastructure that enables IT networks to function. OT...
Examining Predator Mercenary Spyware
HYAS Labs, the R&D arm of HYAS, has been following the research by CitizenLab and Sekoia on the...
Stopping Cyber Attacks Against the Financial Sector: Four Use Cases
The financial sector is a prime target for cyber attacks. Financial organizations and their...
OT vs. IT: Equally Critical but Critically Different
While traditional information technology (IT) networks enjoy a seat at the table (and a budget) at...
Detecting and Blocking DNS Tunneling in OT Environments
In previous posts, we have discussed how most malware must employ the domain name system (DNS) at...