Partner Login

HYAS Blog

Why Cybersecurity Must Include Protective DNS
Why Cybersecurity Must Include Protective DNS
David Ratner David Ratner
read more
listing image
HYAS Product Enhancements - Part 1 - February 2024
Chris Needs
read more
What is Proactive Threat Intelligence and Why Should I Care?
What is Proactive Threat Intelligence and Why Should I Care?
David Ratner David Ratner
read more
Using Proactive Intelligence Against Adversary Infrastructure
Using Proactive Intelligence Against Adversary Infrastructure
David Ratner David Ratner
read more
A Recap of Cybersecurity in 2023 and What’s Ahead for 2024
A Recap of Cybersecurity in 2023 and What’s Ahead for 2024
David Ratner David Ratner
read more
What Human Anatomy Can Teach Us About Cybersecurity
What Human Anatomy Can Teach Us About Cybersecurity
David Ratner David Ratner
read more
Chess pieces on a board
What Is Adversary Infrastructure?
David Ratner David Ratner
read more
Soccer goalie misses the ball
Cybersecurity Post-Incident Cleanup – What You’re Probably Not Doing
Dan White
read more
2023 transition to 2024il
10 Cybersecurity Trends That Emerged in 2023
David Ratner David Ratner
read more
Car speeding down roadway
But It Runs Really Fast
David Ratner David Ratner
read more
 HYAS Insight Uncovers and Mitigates a Russian-Based Cyberattack
HYAS Insight Uncovers and Mitigates Russian-Based Cyberattack
Adam Lopez
read more
Effective AI Regulation Requires Adaptability and Collaboration
Effective AI Regulation Requires Adaptability and Collaboration
HYAS HYAS
read more
November 2023 Product Release Notes
November 2023 Product Release News
Chris Needs
read more
OT Not IoT: The Foundation of Network Security
OT, Not IoT: The Foundation of Network Security
David Brunsdon
read more
Future-Proofing Cybersecurity: Why HYAS Built AI-Generated Malware
Future-Proofing Cybersecurity: Why HYAS Built AI-Generated Malware
HYAS HYAS
read more
How to Select a Protective DNS Solution
How to Select a Protective DNS Solution
HYAS HYAS
read more
The Differences Between DNS Protection and Protective DNS
The Differences Between DNS Protection and Protective DNS
Dan White
read more
Examining Predator Mercenary Spyware
Examining Predator Mercenary Spyware
David Brunsdon
read more
Unlock New Possibilities on the HYAS Platform | October 2023 Release
Unlock New Possibilities on the HYAS Platform October 2023 Release
Zia Hotaki
read more
The Vital Role of User Experience In SaaS Cybersecurity Applications
The Vital Role of User Experience In SaaS Cybersecurity Applications
Igor Solovey
read more
How to Stop Phishing Attacks with Protective DNS
How to Stop Phishing Attacks with Protective DNS
Zia Hotaki
read more
HYAS Insight Shines a Light on Financial Fraud
HYAS Insight Shines a Light on Financial Fraud
HYAS HYAS
read more
Enhancing Cybersecurity Investigations With Protective DNS
Enhancing Cybersecurity Investigations With Protective DNS
Gregory Powell
read more
New Capabilities with the September Release of the HYAS Platform
New Capabilities with the September Release of the HYAS Platform
Chris Needs
read more
Harnessing DNS TXT Records for Malware Execution
Harnessing DNS TXT Records for Malware Execution
Dan White
read more
r 12, 2023 HYAS: The Platform of Choice for Managed Services Provider RSM
HYAS: The Platform of Choice for Managed Services Provider RSM
HYAS HYAS
read more
Why DNS Security Can Be Your Most Problematic Blind Spot
Why DNS Security Can Be Your Most Problematic Blind Spot
Dave Mitchell Dave Mitchell
read more
How Protective DNS Empowers MSSPs
How Protective DNS Empowers MSSPs
Adam Lopez
read more
Meet Mike Barker HYAS Chief Commercial Officer
The Rise of the Startup CCO: Meet Mike Barker of HYAS
HYAS HYAS
read more
How to keep your crypto wallet safe
How to Keep Your Crypto Wallet Safe
Kell van Daal
read more
EyeSpy Proof-of-Concept
EyeSpy Proof-of-Concept
Jeff Sims
read more
multi color snake
BlackMamba: Using AI to Generate Polymorphic Malware
Jeff Sims
read more
OT vs. IT: Equally Critical but Critically Different
OT vs. IT: Equally Critical but Critically Different
David Brunsdon
read more
How HYAS Protects the Financial Services Industry
How HYAS Protects the Financial Services Industry
HYAS HYAS
read more
Elevate Your Threat Hunting with JARM
Elevate Your Threat Hunting with JARM
David Ratner David Ratner
read more
Get to Know the HYAS CEO: David Ratner
Get to Know the HYAS CEO: David Ratner
HYAS HYAS
read more
The Secret to Cybersecurity Lies in Interrupting and Updating Causation Chains
Why HYAS? The Secret to Cybersecurity Lies in Interrupting and Updating Causation Chains
David Ratner David Ratner
read more
HYAS Protection for growing businesses
HYAS Protection for growing businesses
HYAS HYAS
read more
Smart Tvs require even smarter security measures
Smart TVs Require Even Smarter Security Measures
Kell van Daal
read more
Attacker Infrastructure: How Hackers Build It and How to Use It Against Them
Attacker Infrastructure: How Hackers Build It and How to Use It Against Them
HYAS HYAS
read more
Easy as PyPI Pie
Easy as PyPI Pie
Kell van Daal
read more
Critical Infrastructure Attacks: New Rules, New Game
Critical Infrastructure Attacks: New Rules, New Game
David Ratner David Ratner
read more
Cyber Adversary Infrastructure, Explained
Cyber Adversary Infrastructure Explained
David Ratner David Ratner
read more
Why We Still Haven’t Learned From the Target Data Breach a Decade Later
Why We Still Haven’t Learned From the Target Data Breach a Decade Later
Kell van Daal
read more
Reflections on third-party validation of HYAS capabilties
Reflections on third-party validation of HYAS capabilties
David Ratner David Ratner
read more
Hot Air Balloon HYAS moving up
HYAS Heads into RSA with Strong Momentum and Plenty of Exciting News
David Ratner David Ratner
read more
listing image
Detecting and Blocking DNS Tunneling in OT Environments
David Brunsdon
read more
listing image
Demystifying the Confusion Around DNS Security
HYAS HYAS
read more
listing image
Stop Abuse in the Digital Age: Anti-Human Trafficking Intelligence
HYAS HYAS
read more
listing image
Defeating Malvertising-Based Phishing Attacks
Kell van Daal
read more
Small and Medium Sized Businesses Need More Than Just AntiVirus Protection
Why Small and Medium Sized Businesses Need More Than Just AntiVirus
HYAS HYAS
read more
listing image
Threat Actors Are Using Google Ads to Launch Phishing Attacks
Kell van Daal
read more
listing image
Which Protective DNS Keeps You Safest From Cyber Threats? (Part 2)
Kell van Daal
read more
listing image
Putting an End to Emotet: Measuring the Efficacy of Protective DNS
Kell van Daal
read more
listing image
Which Protective DNS Provider Keeps You Safest from Malware?
Kell van Daal
read more
listing image
Making the Most of Your Flow Data with DNS Telemetry
Dave Mitchell Dave Mitchell
read more
listing image
How Do You Know When a Domain Is a Threat?
Kyle Thompson Kyle Thompson
read more
listing image
How Does the Rapid Increase in Endpoint Devices Affect Cybersecurity?
David Ratner David Ratner
read more
listing image
David Ratner Discusses the Current State of Security in Cybernews Interview
HYAS HYAS
read more
listing image
Revising Our Approach to Cybersecurity to Face Contemporary Challenges
David Ratner David Ratner
read more
listing image
Applying a Risk-Based Approach to Cybersecurity Compliance
HYAS HYAS
read more
listing image
Protective DNS a Scalable, Continuous Method for Detecting Log4J Attacks
Dave Mitchell Dave Mitchell
read more
listing image
Staying Off the OCR Wall of Shame Means Thinking Beyond HIPAA and HITRUST
HYAS HYAS
read more
Blocking more doesn't mean better
Blocking More Doesn’t Mean Better
David Ratner David Ratner
read more
listing image
Your Existing Security and Visibility is Not Enough
David Ratner David Ratner
read more
listing image
Protect Your Network With DNS Data
HYAS HYAS
read more
listing image
When You’re Getting Clobbered, Shift Your Approach or Suffer Defeat
David Ratner David Ratner
read more
Darkside ransom Tor page
Anatomy of a Ransomware Attack
HYAS HYAS
read more
listing image
Visualizing Threat Intelligence with HYAS Insight and Anomali Explore
HYAS HYAS
read more
listing image
Transforming Threat Intelligence with Maltego + HYAS
HYAS HYAS
read more
listing image
HYAS Insight: Detonating Malware, Understanding Adversary Command & Control
HYAS HYAS
read more
listing image
Protective DNS with HYAS Protect: CISA/NSA Guidance
HYAS HYAS
read more
listing image
Cyber Threats: Criminal Gangs, Nation-State Actors, and Script Kiddies
Todd Thiemann Todd Thiemann
read more
Indicators of Compromise
HYAS Protect Integration with Microsoft Defender for Endpoint
HYAS HYAS
read more
listing image
Series B: Scaling the Paradigm Shift
David Ratner David Ratner
read more
listing image
Simplifying Threat Investigations: New HYAS Insight Playbooks for Microsoft Azure Sentinel
HYAS HYAS
read more
listing image
DNS: The High Fidelity but Underutilized Threat Signal
Todd Thiemann Todd Thiemann
read more
listing image
Investigating Brand Infringement with HYAS Insight
Todd Thiemann Todd Thiemann
read more
listing image
Turbocharging Threat Investigations: HYAS Insight Connector for Microsoft Azure Sentinel
HYAS HYAS
read more
listing image
DNS over HTTPS: Balancing Security and Privacy
Todd Thiemann Todd Thiemann
read more
listing image
First West Credit Union Speeds Cyber Fraud Investigations with HYAS
Todd Thiemann Todd Thiemann
read more
listing image
Accelerate Investigation & Attribution with Avalon and HYAS Insight
Todd Thiemann Todd Thiemann
read more
listing image
Immediately Triage Threats with the Polarity-HYAS Integration
HYAS HYAS
read more
listing image
Accelerating Investigations: Announcing HYAS Insight 1.1
HYAS HYAS
read more
Man in dark hoodie with bright light from above.
APT33 During the Coronavirus Pandemic: July 2020 Update
HYAS Intel Team HYAS Intel Team
read more
listing image
2020 Verizon Data Breach Investigations Report
Todd Thiemann Todd Thiemann
read more
listing image
Why I joined HYAS as CEO
David Ratner David Ratner
read more
listing image
HYAS Appoints Technologist and Software Industry Veteran Dr. David Ratner as CEO
HYAS HYAS
read more
load more +

threat reports

listing image

Protecting Yourself from Malicious Browser Extensions

Kell van Daal
read more
listing image

Lazarus Group “Operation Dream Job”: Lessons in Attack Infrastructure

HYAS Intel Team HYAS Intel Team
read more
Ryuk crypto ledger and asian crypto traders

Inside Ryuk Crime (Crypto) Ledger & Asian Crypto Traders

HYAS Intel Team HYAS Intel Team
read more