HYAS Blog

Easy as PyPI Pie
Easy as PyPI Pie
Kell van Daal
read more
Critical Infrastructure Attacks: New Rules, New Game
Critical Infrastructure Attacks: New Rules, New Game
David Ratner David Ratner
read more
Cyber Adversary Infrastructure, Explained
Cyber Adversary Infrastructure Explained
David Ratner David Ratner
read more
Why We Still Haven’t Learned From the Target Data Breach a Decade Later
Why We Still Haven’t Learned From the Target Data Breach a Decade Later
Kell van Daal
read more
Reflections on third-party validation of HYAS capabilties
Reflections on third-party validation of HYAS capabilties
David Ratner David Ratner
read more
Hot Air Balloon HYAS moving up
HYAS Heads into RSA with Strong Momentum and Plenty of Exciting News
David Ratner David Ratner
read more
listing image
Detecting and Blocking DNS Tunneling in OT Environments
David Brunsdon
read more
listing image
Demystifying the Confusion Around DNS Security
HYAS HYAS
read more
listing image
Stop Abuse in the Digital Age: Anti-Human Trafficking Intelligence
HYAS HYAS
read more
multi color snake
BlackMamba: Using AI to Generate Polymorphic Malware
Jeff Sims
read more
listing image
Defeating Malvertising-Based Phishing Attacks
Kell van Daal
read more
Small and Medium Sized Businesses Need More Than Just AntiVirus Protection
Why Small and Medium Sized Businesses Need More Than Just AntiVirus
HYAS HYAS
read more
listing image
Threat Actors Are Using Google Ads to Launch Phishing Attacks
Kell van Daal
read more
listing image
Which Protective DNS Keeps You Safest From Cyber Threats? (Part 2)
Kell van Daal
read more
listing image
WOW! We Have a Problem…
HYAS HYAS
read more
listing image
Putting an End to Emotet: Measuring the Efficacy of Protective DNS
Kell van Daal
read more
listing image
Which Protective DNS Provider Keeps You Safest from Malware?
Kell van Daal
read more
listing image
Making the Most of Your Flow Data with DNS Telemetry
Dave Mitchell Dave Mitchell
read more
listing image
How Do You Know When a Domain Is a Threat?
Kyle Thompson Kyle Thompson
read more
listing image
How Does the Rapid Increase in Endpoint Devices Affect Cybersecurity?
David Ratner David Ratner
read more
listing image
David Ratner Discusses the Current State of Security in Cybernews Interview
HYAS HYAS
read more
listing image
Revising Our Approach to Cybersecurity to Face Contemporary Challenges
David Ratner David Ratner
read more
listing image
Applying a Risk-Based Approach to Cybersecurity Compliance
HYAS HYAS
read more
listing image
Protective DNS a Scalable, Continuous Method for Detecting Log4J Attacks
Dave Mitchell Dave Mitchell
read more
listing image
Staying Off the OCR Wall of Shame Means Thinking Beyond HIPAA and HITRUST
HYAS HYAS
read more
Blocking more doesn't mean better
Blocking More Doesn’t Mean Better
David Ratner David Ratner
read more
listing image
Your Existing Security and Visibility is Not Enough
David Ratner David Ratner
read more
listing image
Protect Your Network With DNS Data
HYAS HYAS
read more
listing image
When You’re Getting Clobbered, Shift Your Approach or Suffer Defeat
David Ratner David Ratner
read more
Darkside ransom Tor page
Anatomy of a Ransomware Attack
HYAS HYAS
read more
listing image
Visualizing Threat Intelligence with HYAS Insight and Anomali Explore
HYAS HYAS
read more
listing image
Transforming Threat Intelligence with Maltego + HYAS
HYAS HYAS
read more
listing image
HYAS Insight: Detonating Malware, Understanding Adversary Command & Control
HYAS HYAS
read more
listing image
Protective DNS with HYAS Protect: CISA/NSA Guidance
HYAS HYAS
read more
listing image
Cyber Threats: Criminal Gangs, Nation-State Actors, and Script Kiddies
Todd Thiemann Todd Thiemann
read more
Indicators of Compromise
HYAS Protect Integration with Microsoft Defender for Endpoint
HYAS HYAS
read more
listing image
Series B: Scaling the Paradigm Shift
David Ratner David Ratner
read more
listing image
Simplifying Threat Investigations: New HYAS Insight Playbooks for Microsoft Azure Sentinel
HYAS HYAS
read more
listing image
DNS: The High Fidelity but Underutilized Threat Signal
Todd Thiemann Todd Thiemann
read more
listing image
Investigating Brand Infringement with HYAS Insight
Todd Thiemann Todd Thiemann
read more
listing image
Turbocharging Threat Investigations: HYAS Insight Connector for Microsoft Azure Sentinel
HYAS HYAS
read more
listing image
DNS over HTTPS: Balancing Security and Privacy
Todd Thiemann Todd Thiemann
read more
listing image
First West Credit Union Speeds Cyber Fraud Investigations with HYAS
Todd Thiemann Todd Thiemann
read more
listing image
Accelerate Investigation & Attribution with Avalon and HYAS Insight
Todd Thiemann Todd Thiemann
read more
listing image
Immediately Triage Threats with the Polarity-HYAS Integration
HYAS HYAS
read more
listing image
Accelerating Investigations: Announcing HYAS Insight 1.1
HYAS HYAS
read more
listing image
APT33 During the Coronavirus Pandemic: July 2020 Update
HYAS Intel Team HYAS Intel Team
read more
listing image
2020 Verizon Data Breach Investigations Report
Todd Thiemann Todd Thiemann
read more
listing image
ZDNet: Silent Night Zeus financial botnet sold in underground forums
HYAS HYAS
read more
listing image
HelpNetSecurity Reviews HYAS Insight Threat Intelligence Solution
HYAS HYAS
read more
littleboybotnet-screenshot
Krebs on Security: French Firms Rocked by Kasbah Hacker?
HYAS HYAS
read more
listing image
Why I joined HYAS as CEO
David Ratner David Ratner
read more
listing image
HYAS Appoints Technologist and Software Industry Veteran Dr. David Ratner as CEO
HYAS HYAS
read more
listing image
Krebs on Security: The Rise of “Bulletproof” Residential Networks
HYAS HYAS
read more
Are you Covered? (sign in sky)
Phishing Attacks Continue to Challenge Healthcare Industry
HYAS HYAS
read more
listing image
Why Attribution Really Is Not A Choice
HYAS HYAS
read more
listing image
Comox Maltego Transforms on the Hub!
HYAS HYAS
read more
listing image
Leveling the Battlefield
HYAS HYAS
read more
listing image
Cyber Attribution for Enterprise
HYAS HYAS
read more
Microsoft Pours Millions into Startup that Nails Cybercriminals
HYAS HYAS
read more
listing image
Next Generation of Information Security Technology Investment in HYAS
HYAS HYAS
read more
Attribution-Hacker-Image
Uncovering The Cyberattacker, Not Just The Cyberattack
HYAS HYAS
read more
listing image
Attribution Intelligence: Illuminating the Shadows
HYAS HYAS
read more
10 to Watch 2018: HYAS Infosec
HYAS HYAS
read more
load more +

threat reports

listing image

Protecting Yourself from Malicious Browser Extensions

Kell van Daal
read more
listing image

Lazarus Group “Operation Dream Job”: Lessons in Attack Infrastructure

HYAS Intel Team HYAS Intel Team
read more
Ryuk crypto ledger and asian crypto traders

Inside Ryuk Crime (Crypto) Ledger & Asian Crypto Traders

HYAS Intel Team HYAS Intel Team
read more

GET THE INFORMATION TO GO OVER, AROUND, OR STRAIGHT THROUGH ADVERSARIES.

Sign up for our (WHAT IS FREQUENCY) newsletter.