HYAS Blog

Stay ahead of cyber threats with HYAS! Explore our cybersecurity blog for the latest insights, analysis, expert tips, and industry news.

Patching Is Not a Strategy

It’s 2024 and if you didn’t know or realize it, your cybersecurity strategy cannot depend and rely...

Read More
Caught in the Act: StealC, the Cyber Thief in C

Weekly Threat Intelligence Report Date: July 15, 2024 Prepared by: David Brunsdon, Threat...

Read More
The Pivotal Role Protective DNS Plays In Cyber Defense

Bad actors will always find a way to penetrate organizations if they want to. Businesses need to...

Read More
HYAS Protects Against Polyfill.io Supply Chain Attack with DNS Safeguards

Weekly Threat Intelligence Report Date: June 28, 2024 Prepared by: David Brunsdon, Threat...

Read More
StealC & Vidar Malware Campaign Identified

Weekly Threat Intelligence Report Date: June 24, 2024 Prepared by: David Brunsdon, Threat...

Read More
The Secret Ingredient to Preempt Cyberattacks: Digital Exhaust

Understanding whether a given communication steam is normal, expected, or anomalous and...

Read More
Leveraging ASNs and Pivoting to Uncover Malware Campaigns

Identifying and Mitigating Complex Malware Campaigns with ASNs This week, I spent a good deal of...

Read More
Five Proven Techniques to Optimize Threat Intelligence

The most devious criminals are always one (or several) steps ahead of their victims. To stop them...

Read More
Revealing LOTL Techniques Used by An Active Remcos Malware Campaign

Weekly Threat Intelligence Report Date: June 10, 2024 Prepared by: David Brunsdon, Threat...

Read More
It's Not Me, It's You: Why Companies Are Breaking Up with RiskIQ

With RiskIQ’s integration into Microsoft Defender and the impending end-of-life for its standalone...

Read More
Tracking An Active Remcos Malware Campaign

Weekly Threat Intelligence Report Date: June 3, 2024 Prepared by: David Brunsdon, Threat...

Read More