blog

Stopping Abuse in the Digital Age With The Anti-Human Trafficking Intelligence Initiative
HYAS
read more
BlackMamba: Using AI to Generate Polymorphic Malware
Jeff Sims
read more
Defeating Malvertising-Based Phishing Attacks
Kell van Daal
read more
Why Small and Medium Sized Businesses Need More Than Just an AntiVirus Solution
HYAS
read more
Threat Actors Are Using Google Ads to Launch Phishing Attacks
Kell van Daal
read more
Which Protective DNS Keeps You Safest From Cyber Threats? (Part 2)
Kell van Daal
read more
WOW! We Have a Problem…
HYAS
read more
Putting an End to Emotet: Measuring the Real-World Efficacy of Protective DNS Providers
Kell van Daal
read more
Which Protective DNS Provider Keeps You Safest from Malware and Other Cyber Threats?
Kell van Daal
read more
How Do You Know When a Domain Is a Threat?
Kyle Thompson
read more
How Does the Rapid Increase in Endpoint Devices Affect Cybersecurity?
David Ratner
read more
Revising Our Approach to Cybersecurity to Face Contemporary Challenges
David Ratner
read more
Applying a Risk-Based Approach to Cybersecurity Compliance
HYAS
read more
Protective DNS a Scalable, Continuous Method for Detecting Log4J Attacks
Dave Mitchell
read more
Staying Off the OCR Wall of Shame Means Thinking Beyond HIPAA and HITRUST
HYAS
read more
Blocking more doesn't mean better
Blocking More Doesn’t Mean Better
David Ratner
read more
Your Existing Security and Visibility is Not Enough
David Ratner
read more
Protect Your Network With DNS Data
HYAS
read more
When You’re Getting Clobbered, Shift Your Approach or Suffer Defeat
David Ratner
read more
Darkside ransom Tor page
Anatomy of a Ransomware Attack
HYAS
read more
Visualizing Threat Intelligence with HYAS Insight and Anomali Explore
HYAS
read more
Transforming Threat Intelligence with Maltego + HYAS
HYAS
read more
HYAS Insight: Detonating Malware, Understanding Adversary Command & Control
HYAS
read more
Protective DNS with HYAS Protect: CISA/NSA Guidance
HYAS
read more
Understanding Cyber Threats: Criminal Gangs, Nation-State Actors, and Script Kiddies
Todd Thiemann
read more
HYAS Protect Integration with Microsoft Defender for Endpoint
HYAS
read more
Series B: Scaling the Paradigm Shift
David Ratner
read more
Simplifying Threat Investigations: New HYAS Insight Playbooks for Microsoft Azure Sentinel
HYAS
read more
DNS: The High Fidelity but Underutilized Threat Signal
Todd Thiemann
read more
Investigating Brand Infringement with HYAS Insight
Todd Thiemann
read more
Turbocharging Threat Investigations: HYAS Insight Connector for Microsoft Azure Sentinel
HYAS
read more
DNS over HTTPS: Balancing Security and Privacy
Todd Thiemann
read more
First West Credit Union Speeds Cyber Fraud Investigations with HYAS
Todd Thiemann
read more
Accelerate Investigation & Attribution with Avalon and HYAS Insight
Todd Thiemann
read more
Immediately Triage Threats with the Polarity-HYAS Integration
HYAS
read more
Accelerating Investigations: Announcing HYAS Insight 1.1
HYAS
read more
APT33 During the Coronavirus Pandemic: July 2020 Update
HYAS Intel Team
read more
2020 Verizon Data Breach Investigations Report (DBIR): Criminal Gangs & Domains
Todd Thiemann
read more
Why I joined HYAS as CEO
David Ratner
read more
Phishing Attacks Continue to Challenge Healthcare Industry
HYAS
read more
Comox Maltego Transforms on the Hub!
HYAS
read more
Leveling the Battlefield
HYAS
read more
Attribution Intelligence: Illuminating the Shadows
HYAS
read more
load more +

threat reports

Lazarus Group “Operation Dream Job”: Lessons in Attack Infrastructure

HYAS Intel Team
read more
Ryuk crypto ledger and asian crypto traders

Inside Ryuk Crime (Crypto) Ledger & Asian Crypto Traders

HYAS Intel Team
read more

The SolarWinds Hack: Understanding The Adversary Infrastructure

HYAS Intel Team
read more

GET THE INFORMATION TO GO OVER, AROUND, OR STRAIGHT THROUGH ADVERSARIES.

Sign up for our (WHAT IS FREQUENCY) newsletter.