HYAS Blog | Blog Listing Page

Stay ahead of cyber threats with HYAS! Explore our cybersecurity blog for the latest insights, analysis, expert tips, and industry news.

Inside Ryuk Crime (Crypto) Ledger & Asian Crypto Traders

The following article is co-authored by threat intelligence researchers from HYAS and Advanced...

Read More
The SolarWinds Hack: Understanding The Adversary Infrastructure

The capabilities and possible victims of the recent SolarWinds hack and the SunBurst backdoor are...

Read More
Mapping Adversary Infrastructure: A Real-world (North Korean) Example

The news article “Hackers use fake media domains to trick North Korea researchers” by Nils...

Read More
Latest Roaming Mantis Campaign Targets Banks in Japan and Turkey

Summary Roaming Mantis is a Chinese-speaking threat actor group that has been active since at...

Read More
New HYAS Insight Playbooks for Microsoft Azure Sentinel

The HYAS Insight Logic Apps connector for Microsoft Azure Sentinel was announced and generally...

Read More
DNS: The High Fidelity but Underutilized Threat Signal

Malware in general, and ransomware in particular, is the scourge of enterprises today. You can look...

Read More
Investigating Brand Infringement with HYAS Insight

HYAS Insight is a key tool for SOC and fraud teams for use cases like incident response and fraud...

Read More
HYAS Insight Connector for Microsoft Azure Sentinel

Enterprises are embracing digital transformation to speed business during a pandemic, and that...

Read More
DNS over HTTPS: Balancing Security and Privacy

DNS over HTTPS (DoH) is making news headlines again and causing some consternation in enterprise...

Read More
First West Credit Union Speeds Cyber Fraud Investigations with HYAS

Something I regularly get asked is, “How do enterprises use HYAS Insight to accelerate their...

Read More
Accelerate Investigation & Attribution with Avalon and HYAS Insight

Investigating security incidents is seldom a straightforward process. Investigations are...

Read More
Immediately Triage Threats with the Polarity-HYAS Integration

This blog article is cross-posted with edits from the Polarity blog. Today’s post continues an...

Read More