HYAS Blog | Blog Listing Page
Stay ahead of cyber threats with HYAS! Explore our cybersecurity blog for the latest insights, analysis, expert tips, and industry news.
Easy as PyPI Pie
Recently PyPI suspended new user sign-ups as well as new project registration, citing the volume of...
Critical Infrastructure Attacks: New Rules, New Game
Critical infrastructure lacking proper protection leaves itself open to a greater number of...
Cyber Adversary Infrastructure Explained
Cyber threat actors rely on infrastructure hidden to most people not looking for it. Revealing such...
Why We Still Haven’t Learned from the Target Data Breach Years Later
The threat actor’s methodology wasn’t unique — they used a six-step approach that can be mapped...
Reflections on third-party validation of HYAS capabilties
It was the summer of 2019, and I spent an hour walking around downtown Los Altos in Silicon Valley...
Protecting Yourself from Malicious Browser Extensions
Browser extension-based malware can range from annoying to catastrophic, but following these tips...
HYAS Heads into RSA with Strong Momentum and Plenty of Exciting News
I had the privilege to join HYAS as CEO in 2019 shortly after M12 led its Series A investment in...
Detecting and Blocking DNS Tunneling in OT Environments
In previous posts, we have discussed how most malware must employ the domain name system (DNS) at...
Demystifying the Confusion Around DNS Security
As is often the case in cybersecurity, the term “DNS security" can mean a variety of things in...
Stop Abuse in the Digital Age: Anti-Human Trafficking Intelligence
At HYAS, we take pride in our effort to try to make a positive impact on the world whenever...
Defeating Malvertising-Based Phishing Attacks
Malvertising Enters a New Age While Google grapples with the potential threat that ChatGPT poses to...
Why Small and Medium Sized Businesses Need More Than Just AntiVirus
As the size and scope of cybercriminal activity continues to grow, small and medium-sized...