Featured Post ─

Transforming Threat Intelligence with Maltego + HYAS

Maltego is a popular data visualization tool that links data together in relationship graphs. The graphs are composed of entities that have unique properties. There are many link analysis tools capable of representing relationships in data, but a major benefit of Maltego is that users can seamlessly integrate data from disparate sources into an investigation by running Maltego Transforms that fetch new data and plot it on the graph as Entities. There are many fantastic sources of data that can be combined, accessible via the Maltego Transform Hub.

HYAS

HYAS

April 15, 2021

Featured Post ─

Protective DNS with HYAS Protect: CISA/NSA Guidance

The National Security Agency (NSA) and Cybersecurity and Infrastructure Agency (CISA) have released a joint information sheet that offers guidance on the benefits of using a protective DNS service and how to choose and implement a protective DNS solution. This publication details the benefits of using a protective Domain Name System (PDNS) service along with cybersecurity best practices around protective DNS. HYAS™ Protect is not only a highlighted solution, but also one of the most innovative and effective. 

HYAS

HYAS

March 29, 2021

Featured Post ─

Series B: Scaling the Paradigm Shift

Raising money is often anti-climatic --- the fundraising process is done, and it’s right back to execution and growth.  It’s important to occasionally sit back and reflect.

David Ratner

David Ratner

February 25, 2021

Blog

Transforming Threat Intelligence with Maltego + HYAS

Transforming Threat Intelligence with Maltego + HYAS

Maltego is a popular data visualization tool that links data together in relationship graphs. The graphs are composed of entitie...

HYAS

HYAS

April 15, 2021

HYAS Insight: Detonating Malware, Understanding Adversary Command & Control

HYAS Insight: Detonating Malware, Understanding Adversary Command & Control

HYAS Insight continues to be instrumental to organizations wanting to understand the adversary infrastructure that is behind cyb...

HYAS

HYAS

March 29, 2021

Protective DNS with HYAS Protect: CISA/NSA Guidance

Protective DNS with HYAS Protect: CISA/NSA Guidance

The National Security Agency (NSA) and Cybersecurity and Infrastructure Agency (CISA) have released a joint information sheet th...

HYAS

HYAS

March 29, 2021

Understanding Cyber Threats: Criminal Gangs, Nation-State Actors, and Script Kiddies

Understanding Cyber Threats: Criminal Gangs, Nation-State Actors, and Script Kiddies

A Gartner analyst recently asked me what HYAS thought was the number of organized cybercriminal gangs operating around the world...

Todd Thiemann

Todd Thiemann

March 22, 2021

HYAS Protect Integration with Microsoft Defender for Endpoint

HYAS Protect Integration with Microsoft Defender for Endpoint

HYAS Protect provides a leap forward by utilizing authoritative knowledge of attacker infrastructure including unrivaled domain-...

HYAS

HYAS

February 26, 2021

Series B: Scaling the Paradigm Shift

Series B: Scaling the Paradigm Shift

Raising money is often anti-climatic --- the fundraising process is done, and it’s right back to execution and growth.  It’s imp...

David Ratner

David Ratner

February 25, 2021

Lazarus Group “Operation Dream Job”: Lessons in Attack Infrastructure

Lazarus Group “Operation Dream Job”: Lessons in Attack Infrastructure

The Lazarus Group (aka Hidden Cobra, Labyrinth Chollima, Zinc, Guardians of Peace) is a threat actor group that has been attribu...

HYAS Intel Team

HYAS Intel Team

February 11, 2021

Inside Ryuk Crime (Crypto) Ledger & Asian Crypto Traders

Inside Ryuk Crime (Crypto) Ledger & Asian Crypto Traders

The following article is co-authored by threat intelligence researchers from HYAS and Advanced Intelligence and cross-posted to ...

HYAS Intel Team

HYAS Intel Team

January 7, 2021

The SolarWinds Hack: Understanding The Adversary Infrastructure

The SolarWinds Hack: Understanding The Adversary Infrastructure

The capabilities and possible victims of the recent SolarWinds hack and the SunBurst backdoor are becoming clearer as the cybers...

HYAS Intel Team

HYAS Intel Team

December 23, 2020

Mapping Adversary Infrastructure: A Real-world (North Korean) Example

Mapping Adversary Infrastructure: A Real-world (North Korean) Example

The news article “Hackers use fake media domains to trick North Korea researchers” by Nils Weisensee appeared in NKNews.org on D...

HYAS Intel Team

HYAS Intel Team

December 22, 2020