HYAS Blog | Blog Listing Page

Stay ahead of cyber threats with HYAS! Explore our cybersecurity blog for the latest insights, analysis, expert tips, and industry news.

Critical Infrastructure Attacks: New Rules, New Game

Critical infrastructure lacking proper protection leaves itself open to a greater number of...

Read More
Cyber Adversary Infrastructure Explained

Cyber threat actors rely on infrastructure hidden to most people not looking for it. Revealing such...

Read More
Why We Still Haven’t Learned from the Target Data Breach Years Later

The threat actor’s methodology wasn’t unique — they used a six-step approach that can be mapped...

Read More
Reflections on third-party validation of HYAS capabilties

It was the summer of 2019, and I spent an hour walking around downtown Los Altos in Silicon Valley...

Read More
Protecting Yourself from Malicious Browser Extensions

Browser extension-based malware can range from annoying to catastrophic, but following these tips...

Read More
HYAS Heads into RSA with Strong Momentum and Plenty of Exciting News

I had the privilege to join HYAS as CEO in 2019 shortly after M12 led its Series A investment in...

Read More
Detecting and Blocking DNS Tunneling in OT Environments

In previous posts, we have discussed how most malware must employ the domain name system (DNS) at...

Read More
Demystifying the Confusion Around DNS Security

As is often the case in cybersecurity, the term “DNS security" can mean a variety of things in...

Read More
Stop Abuse in the Digital Age: Anti-Human Trafficking Intelligence

At HYAS, we take pride in our effort to try to make a positive impact on the world whenever...

Read More
Defeating Malvertising-Based Phishing Attacks

Malvertising Enters a New Age While Google grapples with the potential threat that ChatGPT poses to...

Read More
Why Small and Medium Sized Businesses Need More Than Just AntiVirus

As the size and scope of cybercriminal activity continues to grow, small and medium-sized...

Read More
Threat Actors Are Using Google Ads to Launch Phishing Attacks

Year after year, phishing tops the list of the leading causes of data breaches. Afterall, a threat...

Read More