HYAS Blog | Blog Listing Page

Stay ahead of cyber threats with HYAS! Explore our cybersecurity blog for the latest insights, analysis, expert tips, and industry news.

The Secret to Cybersecurity Lies in Interrupting Causation Chains

Cybersecurity has never been more critical. The frequency and scope of cyberattacks like...

Read More
HYAS Protection for growing businesses

Securing SMB Success: The Indispensable Role of Protective DNS Cyber attacks pose as much risk to...

Read More
Smart TVs Require Even Smarter Security Measures

Smart TV Dilemmas It's hard nowadays to find a TV that is not "smart". They all come preloaded with...

Read More
Attacker Infrastructure: How to Use It Against Hackers

Hackers often spend weeks or months lurking on a target network to prepare for an eventual...

Read More
Easy as PyPI Pie

Recently PyPI suspended new user sign-ups as well as new project registration, citing the volume of...

Read More
Critical Infrastructure Attacks: New Rules, New Game

Critical infrastructure lacking proper protection leaves itself open to a greater number of...

Read More
Cyber Adversary Infrastructure Explained

Cyber threat actors rely on infrastructure hidden to most people not looking for it. Revealing such...

Read More
Why We Still Haven’t Learned from the Target Data Breach Years Later

The threat actor’s methodology wasn’t unique — they used a six-step approach that can be mapped...

Read More
Reflections on third-party validation of HYAS capabilties

It was the summer of 2019, and I spent an hour walking around downtown Los Altos in Silicon Valley...

Read More
Protecting Yourself from Malicious Browser Extensions

Browser extension-based malware can range from annoying to catastrophic, but following these tips...

Read More
HYAS Heads into RSA with Strong Momentum and Plenty of Exciting News

I had the privilege to join HYAS as CEO in 2019 shortly after M12 led its Series A investment in...

Read More
Detecting and Blocking DNS Tunneling in OT Environments

In previous posts, we have discussed how most malware must employ the domain name system (DNS) at...

Read More