HYAS Blog | Blog Listing Page
Stay ahead of cyber threats with HYAS! Explore our cybersecurity blog for the latest insights, analysis, expert tips, and industry news.
The Secret to Cybersecurity Lies in Interrupting Causation Chains
Cybersecurity has never been more critical. The frequency and scope of cyberattacks like...
HYAS Protection for growing businesses
Securing SMB Success: The Indispensable Role of Protective DNS Cyber attacks pose as much risk to...
Smart TVs Require Even Smarter Security Measures
Smart TV Dilemmas It's hard nowadays to find a TV that is not "smart". They all come preloaded with...
Attacker Infrastructure: How to Use It Against Hackers
Hackers often spend weeks or months lurking on a target network to prepare for an eventual...
Easy as PyPI Pie
Recently PyPI suspended new user sign-ups as well as new project registration, citing the volume of...
Critical Infrastructure Attacks: New Rules, New Game
Critical infrastructure lacking proper protection leaves itself open to a greater number of...
Cyber Adversary Infrastructure Explained
Cyber threat actors rely on infrastructure hidden to most people not looking for it. Revealing such...
Why We Still Haven’t Learned from the Target Data Breach Years Later
The threat actor’s methodology wasn’t unique — they used a six-step approach that can be mapped...
Reflections on third-party validation of HYAS capabilties
It was the summer of 2019, and I spent an hour walking around downtown Los Altos in Silicon Valley...
Protecting Yourself from Malicious Browser Extensions
Browser extension-based malware can range from annoying to catastrophic, but following these tips...
HYAS Heads into RSA with Strong Momentum and Plenty of Exciting News
I had the privilege to join HYAS as CEO in 2019 shortly after M12 led its Series A investment in...
Detecting and Blocking DNS Tunneling in OT Environments
In previous posts, we have discussed how most malware must employ the domain name system (DNS) at...