Partner Login

Hyas News Room

HYAS Achieves SOC 2, Type 1 Compliance
HYAS Achieves SOC 2, Type 1 Compliance
read more
Your #1 Security Initiative in 2024 Should be Operational Resilience
Your #1 Security Initiative in 2024 Should be Operational Resilience
read more
Cybersecurity Visionary Kate Kuehn Joins HYAS Board of Directors
Cybersecurity Visionary Kate Kuehn Joins HYAS Board of Directors
read more
VPNOverview Exclusive: Jeff Sims on Harnessing AI for Cybersecurity
VPNOverview Exclusive: Jeff Sims on Harnessing AI for Cybersecurity
read more
HYAS Celebrates 2023 Benchmarks
HYAS Celebrates 2023 Benchmarks
read more
Security Today Announces Winners of the 2023 CyberSecured Awards
Security Today Announces Winners of the 2023 CyberSecured Awards
read more
Cybersecurity Takeaways of 2023 — and What’s Ahead in 2024
Cybersecurity Takeaways of 2023 — and What’s Ahead in 2024
read more
5 Critical Steps to Prepare for AI-Powered Malware in Your Connected Asset Ecosystem
5 Critical Steps to Prepare for AI-Powered Malware in Your Connected Asset Ecosystem
read more
HYAS Selected as a 2023 Digital Innovator by Intellyx
HYAS Selected as a 2023 Digital Innovator by Intellyx
read more
HYAS Infosec Groundbreaking Research on AI-Generated Malware Contributes to the AI Act, Other AI Policies and Regulations
HYAS Infosec Groundbreaking Research on AI-Generated Malware Contributes to the AI Act, Other AI Policies and Regulations
read more
HYAS AI-Generated Malware Research Contributes to EU’s AI Act
HYAS AI-Generated Malware Research Contributes to EU’s AI Act
read more
Thwarting a Russian-Based Cyberattack on a Global Bank
Thwarting a Russian-Based Cyberattack on a Global Bank
read more
HYAS Selected as a 2023 Digital Innovator by Intellyx
HYAS Selected as a 2023 Digital Innovator by Intellyx
read more
CISA Official Argues ‘Patch Faster, Fix Faster’ Is a Failed Model
CISA Official Argues ‘Patch Faster, Fix Faster’ Is a Failed Model
read more
HYAS Infosec Groundbreaking Research on AI-Generated Malware Contributes to the AI Act, Other AI Policies and Regulations
HYAS Infosec Groundbreaking Research on AI-Generated Malware Contributes to the AI Act, Other AI Policies and Regulations
read more
EU Adopts
EU Adopts "World First" Cybersecurity Legislation for Manufacturers, Including Oil, Gas Industry
read more
EU Adopts New Rules to Protect Devices Connected to the Internet
EU Adopts New Rules to Protect Devices Connected to the Internet
read more
CISA Roadmap for AI Cybersecurity: Defense of Critical Infrastructure, “Secure by Design” AI Prioritized
CISA Roadmap for AI Cybersecurity: Defense of Critical Infrastructure, “Secure by Design” AI Prioritized
read more
Denmark Weathered Wave of Cyber Attacks on Energy Infrastructure in May, Industry Non-Profit Reveals
Denmark Weathered Wave of Cyber Attacks on Energy Infrastructure in May, Industry Non-Profit Reveals
read more
US Publishes Guidelines for Secure and “Responsible” AI Development
US Publishes Guidelines for Secure and “Responsible” AI Development
read more
CISA Puts Out an AI Roadmap to Protect Critical Infrastructure
CISA Puts Out an AI Roadmap to Protect Critical Infrastructure
read more
Lawfare, Warfare, and Old-Fashioned Crime in the Hybrid Battlespace
Lawfare, Warfare, and Old-Fashioned Crime in the Hybrid Battlespace
read more
HYAS is a Proud Participant in the Microsoft Security Copilot Partner Private Preview
HYAS is a Proud Participant in the Microsoft Security Copilot Partner Private Preview
read more
Denmark’s Energy Infrastructure Pwned Via Zyxel Zero Day
Denmark’s Energy Infrastructure Pwned Via Zyxel Zero Day
read more
Cyberattack Launched Against DP World Australia Port
Cyberattack Launched Against DP World Australia Port
read more
An Average Intrusion Remains Undetected in an Enterprise Network for 99 Days
An Average Intrusion Remains Undetected in an Enterprise Network for 99 Days
read more
Aussie Ports Pwned by Cyberattack
Aussie Ports Pwned by Cyberattack
read more
LDI Connect Selects HYAS Advanced Threat Intelligence and Protective DNS to Add to Its Managed Security Services Portfolio
LDI Connect Selects HYAS Advanced Threat Intelligence and Protective DNS to Add to Its Managed Security Services Portfolio
read more
Cyber Resilience Protection Via ‘Shields Ready’
Cyber Resilience Protection Via ‘Shields Ready’
read more
White House Declares November 2023 Critical Infrastructure and Resilience Month
White House Declares November 2023 Critical Infrastructure and Resilience Month
read more
Healthcare Breaches and an HHS Settlement
Healthcare Breaches and an HHS Settlement
read more
88 Million People Impacted by Health Data Breaches This Year
88 Million People Impacted by Health Data Breaches This Year
read more
Cyber Skills Gap Climbs to 4 Million... Yikes!
Cyber Skills Gap Climbs to 4 Million... Yikes!
read more
Social Engineering by Intimidation
Social Engineering by Intimidation
read more
HYAS Named Winner of the Coveted Top InfoSec Innovator Awards for 2023
HYAS Named Winner of the Coveted Top InfoSec Innovator Awards for 2023
read more
HYAS Examines Predator Mercenary Mobile Spyware
HYAS Examines Predator Mercenary Mobile Spyware
read more
The Top 50 SaaS CEOs of 2023
The Top 50 SaaS CEOs of 2023
read more
City of Philadelphia Has Been Pwned… and the Threat Actors Had Access for Months
City of Philadelphia Has Been Pwned… and the Threat Actors Had Access for Months
read more
Iranian Hackers Were Lurking for 8 Months in a Government Network
Iranian Hackers Were Lurking for 8 Months in a Government Network
read more
Cisco Patches Two Dangerous Zero-Day Vulnerabilities
Cisco Patches Two Dangerous Zero-Day Vulnerabilities
read more
Advice on Protecting an Organization Against APTs
Advice on Protecting an Organization Against APTs
read more
Experts Released PoC Exploit Code for VMware Aria Operations for Logs Flaw
Experts Released PoC Exploit Code for VMware Aria Operations for Logs Flaw
read more
A Crambus Cyberespionage Campaign Prospects a Middle Eastern Government
A Crambus Cyberespionage Campaign Prospects a Middle Eastern Government
read more
VMware Aria Operations for Logs CVE-2023-34051 Technical Deep Dive and IOCs
VMware Aria Operations for Logs CVE-2023-34051 Technical Deep Dive and IOCs
read more
A Stern Glance from All Five Eyes
A Stern Glance from All Five Eyes
read more
Five Eyes Coalition Release Guidelines for Business Leaders on Securing Intellectual Property
Five Eyes Coalition Release Guidelines for Business Leaders on Securing Intellectual Property
read more
CISA, NSA, FBI Issues Guidance on How to Stop Phishing
CISA, NSA, FBI Issues Guidance on How to Stop Phishing
read more
Open Source Software Supply Chain Attacks Have Tripled, But Nearly All Vulnerabilities Are Avoidable by Updating
Open Source Software Supply Chain Attacks Have Tripled, But Nearly All Vulnerabilities Are Avoidable by Updating
read more
40% of Companies Want to “Leave” Ransomware to IT
40% of Companies Want to “Leave” Ransomware to IT
read more
Record High Ransomware Leak Site Victims, Record Low Dwell Times
Record High Ransomware Leak Site Victims, Record Low Dwell Times
read more
HYAS Wins Threat Intelligence Innovation Award in 7th Annual CyberSecurity Breakthrough Awards Program
HYAS Wins Threat Intelligence Innovation Award in 7th Annual CyberSecurity Breakthrough Awards Program
read more
Artificial Intelligence and Election Security
Artificial Intelligence and Election Security
read more
Supply Chain Attacks Triple While Known Vulnerabilities are Downloaded
Supply Chain Attacks Triple While Known Vulnerabilities are Downloaded
read more
How Generative AI Changes Cybersecurity
How Generative AI Changes Cybersecurity
read more
Caesars Entertainment Discloses Cyber Attack, Ransom Payment Made Weeks Before MGM Heist
Caesars Entertainment Discloses Cyber Attack, Ransom Payment Made Weeks Before MGM Heist
read more
Caesars Admits to Being Pwned In Ransomware Attack…. And They Likely Paid Up
Caesars Admits to Being Pwned In Ransomware Attack…. And They Likely Paid Up
read more
Caesars Entertainment Reveals Major Ransomware Breach
Caesars Entertainment Reveals Major Ransomware Breach
read more
Ransomware in the Casinos
Ransomware in the Casinos
read more
Social Engineering and Willie-Suttonesque Attraction of Casinos
Social Engineering and Willie-Suttonesque Attraction of Casinos
read more
Cloud Vulnerabilities Surge 200% Due To Poor Security: IBM
Cloud Vulnerabilities Surge 200% Due To Poor Security: IBM
read more
HYAS Earns New Product Of the Year Award
HYAS Earns New Product Of the Year Award
read more
How AI Challenges Cybersecurity
How AI Challenges Cybersecurity
read more
Massive DDoS Attack Abserved On ‘Influential’ US Financial Firm
Massive DDoS Attack Abserved On ‘Influential’ US Financial Firm
read more
HYAS Protect At Home Named a 2023 New Product of the Year by Security Today
HYAS Protect At Home Named a 2023 New Product of the Year by Security Today
read more
From AI Driven Defense to Dark Web Threat Intelligence
From AI Driven Defense to Dark Web Threat Intelligence
read more
Barracuda Found a Backdoor Trigger in Their Patched Systems
Barracuda Found a Backdoor Trigger in Their Patched Systems
read more
AI-Enhanced Ethical Malware Can Increase Companies' Data Security
AI-Enhanced Ethical Malware Can Increase Companies' Data Security
read more
Earth Estries' Espionage Campaign Detailed By Trend Micro
Earth Estries' Espionage Campaign Detailed By Trend Micro
read more
FBI, International Collaborators, Take Down Qakbot
FBI, International Collaborators, Take Down Qakbot
read more
Industry Reactions to Qakbot Botnet Disruption: Feedback Friday
Industry Reactions to Qakbot Botnet Disruption: Feedback Friday
read more
Sophisticated Cyber-Espionage Group Earth Estries Exposed
Sophisticated Cyber-Espionage Group Earth Estries Exposed
read more
University of Michigan’s has its first day of school offline after a cyberattack
University of Michigan’s has its first day of school offline after a cyberattack
read more
Chinese Influence Campaign Taken Down by Meta Was Long-Running and Persistent
Chinese Influence Campaign Taken Down by Meta Was Long-Running and Persistent
read more
Montreal Utility Hit In Ransomware Attack
Montreal Utility Hit In Ransomware Attack
read more
University of Michigan overcomes cyberattack that delayed the academic year.
University of Michigan overcomes cyberattack that delayed the academic year.
read more
Google Adds Generative AI to Security Tools
Google Adds Generative AI to Security Tools
read more
Purfoods Pwned…. 1.2 Million People Affected
Purfoods Pwned…. 1.2 Million People Affected
read more
78% of Healthcare Orgs Experience Cybersecurity Events: Claroty
78% of Healthcare Orgs Experience Cybersecurity Events: Claroty
read more
Meta Takes Down ‘Spamouflage’ – a Prolific Chinese Disinformation Campaign
Meta Takes Down ‘Spamouflage’ – a Prolific Chinese Disinformation Campaign
read more
4 Cyber Threats That Frequently Evade Detection and How to Address Them
4 Cyber Threats That Frequently Evade Detection and How to Address Them
read more
EyeSpy, the Malware PoC (Proof of Concept) with Cognitive Intelligence, Adapts on the Fly
EyeSpy, the Malware PoC (Proof of Concept) with Cognitive Intelligence, Adapts on the Fly
read more
Australian Utility Company Energy One Limited Pwned In Cyberattack
Australian Utility Company Energy One Limited Pwned In Cyberattack
read more
HiatusRAT Malware Is Back
HiatusRAT Malware Is Back
read more
HiatusRAT Active Against Taiwan, US.
HiatusRAT Active Against Taiwan, US.
read more
Artificial Intelligence Can Change the Balance Between Attacker and Attacker
Artificial Intelligence Can Change the Balance Between Attacker and Attacker
read more
How AI is Challenging Cybersecurity
How AI is Challenging Cybersecurity
read more
Mass Exploitation Campaign Backdoors Almost 2000 Citrix NetScalers
Mass Exploitation Campaign Backdoors Almost 2000 Citrix NetScalers
read more
This AI-Driven Malware Adapts, Makes Decisions Autonomously
This AI-Driven Malware Adapts, Makes Decisions Autonomously
read more
Momentum Cyber Market Review:Emerging Trends In Threat Intelligence
Momentum Cyber Market Review:Emerging Trends In Threat Intelligence
read more
Polymorphic Malware Discovered That Uses AI to Attack Victims
Polymorphic Malware Discovered That Uses AI to Attack Victims
read more
WormGPT and BlackMamba: AI-Generated Phishing And Malware Attacks
WormGPT and BlackMamba: AI-Generated Phishing And Malware Attacks
read more
The Dark Side of ChatGPT: Hackers Tap WormGPT and FraudGPT for Sophisticated Attacks
The Dark Side of ChatGPT: Hackers Tap WormGPT and FraudGPT for Sophisticated Attacks
read more
Disrupting Cyber Communications With Adversary Infrastructure Platform | A Brand Story Conversation From Black Hat USA 2023 | A HYAS Story With David Ratner
Disrupting Cyber Communications With Adversary Infrastructure Platform | A Brand Story Conversation From Black Hat USA 2023 | A HYAS Story With David Ratner
read more
BlackMamba: Using AI to Generate Polymorphic Malware
BlackMamba: Using AI to Generate Polymorphic Malware
read more
Endpoint Security and Network Monitoring News for the Week of August 4
Endpoint Security and Network Monitoring News for the Week of August 4
read more
Cyberwire Daily Briefings: V12 Issue 146 in Attacks, Threats, and Vulnerabilities
Cyberwire Daily Briefings: V12 Issue 146 in Attacks, Threats, and Vulnerabilities
read more
Scoperto Malware
Scoperto Malware
read more
HYAS Warns of AI-Driven Malware With “EyeSpy” POC
HYAS Warns of AI-Driven Malware With “EyeSpy” POC
read more
New Type of Polymorphic Fully Autonomous Malware Uses AI
New Type of Polymorphic Fully Autonomous Malware Uses AI
read more
EyeSpy alarm, the
EyeSpy alarm, the "smart" malware that acts autonomously
read more
HYAS Unveils EyeSpy Proof of Concept for New Type of Polymorphic, Intelligent and Fully Autonomous Malware
HYAS Unveils EyeSpy Proof of Concept for New Type of Polymorphic, Intelligent and Fully Autonomous Malware
read more
New type of Polymorphic Fully Autonomous Malware Uses AI
New type of Polymorphic Fully Autonomous Malware Uses AI
read more
HYAS Unveils EyeSpy Proof of Concept for New Type of Polymorphic, Intelligent and Fully Autonomous Malware
HYAS Unveils EyeSpy Proof of Concept for New Type of Polymorphic, Intelligent and Fully Autonomous Malware
read more
HYAS Unveils EyeSpy Proof of Concept for New Intelligent and Fully Autonomous Malware
HYAS Unveils EyeSpy Proof of Concept for New Intelligent and Fully Autonomous Malware
read more
HYAS EyeSpy POC – First Polymorphic, Intelligent Fully Autonomous AI Malware
HYAS EyeSpy POC – First Polymorphic, Intelligent Fully Autonomous AI Malware
read more
HYAS Foresees Future Havoc to Help Thwart It With “EyeSpy” PoC
HYAS Foresees Future Havoc to Help Thwart It With “EyeSpy” PoC
read more
How Much Protection Does the New “U.S. Cyber Trust Mark” for Smart Devices Offer?
How Much Protection Does the New “U.S. Cyber Trust Mark” for Smart Devices Offer?
read more
New AI Attack Tools Are Emerging… And That Should Concern You
New AI Attack Tools Are Emerging… And That Should Concern You
read more
“First Known” Open Source Supply Chain Attacks Target Banks
“First Known” Open Source Supply Chain Attacks Target Banks
read more
Report Details Cybercrime Potential of AI Driven Chatbots
Report Details Cybercrime Potential of AI Driven Chatbots
read more
SecAlliance Report reveals the cybercrime potential of AI driven chatbots
SecAlliance Report reveals the cybercrime potential of AI driven chatbots
read more
US Federal government issues voluntary security guidelines.
US Federal government issues voluntary security guidelines.
read more
HC3 Warns About AI's Cybersecurity Impacts
HC3 Warns About AI's Cybersecurity Impacts
read more
U.S. Launches Effort to Help Consumers Gauge IoT Device Cybersecurity
U.S. Launches Effort to Help Consumers Gauge IoT Device Cybersecurity
read more
Partial-Patch on Google’s Cloud Build Bug Leaves Supply Chain Risk
Partial-Patch on Google’s Cloud Build Bug Leaves Supply Chain Risk
read more
The White House Launches U.S. Cyber Trust Mark IoT Security Labeling Program
The White House Launches U.S. Cyber Trust Mark IoT Security Labeling Program
read more
HC3 Shares Tips for Defending Against AI-Enhanced Cyberattacks
HC3 Shares Tips for Defending Against AI-Enhanced Cyberattacks
read more
China-Based Hacking Group Breaches Government Email Accounts, Microsoft Reports
China-Based Hacking Group Breaches Government Email Accounts, Microsoft Reports
read more
Stealthy Microsoft-Signed Rootkit Target The Gaming Sector
Stealthy Microsoft-Signed Rootkit Target The Gaming Sector
read more
From AI-Driven Defense to Dark Web Threat Intelligence
From AI-Driven Defense to Dark Web Threat Intelligence
read more
Startup Showcase: HYAS – Empowering Cybersecurity with Advanced Threat Detection
Startup Showcase: HYAS – Empowering Cybersecurity with Advanced Threat Detection
read more
How Real and Present Is the Malware Threat from AI?
How Real and Present Is the Malware Threat from AI?
read more
Exactly How Actual As Well As Existing Is the Malware Danger from AI?
Exactly How Actual As Well As Existing Is the Malware Danger from AI?
read more
Generative AI shakes up the security playing field
Generative AI shakes up the security playing field
read more
Year-Long Cyber Attack on IT Firm Used A Bespoke Malware Called RDStealer
Year-Long Cyber Attack on IT Firm Used A Bespoke Malware Called RDStealer
read more
5 Security Risks of Generative AI and How to Prepare for Them
5 Security Risks of Generative AI and How to Prepare for Them
read more
HYAS Protect Substantially Outperforms All Other Services - According to Independent 3rd Party
HYAS Protect Substantially Outperforms All Other Services - According to Independent 3rd Party
read more
ChatGPT Creates Mutating Malware That Evades Detection by EDR
ChatGPT Creates Mutating Malware That Evades Detection by EDR
read more
ChatGPT Can Generate Mutating Malware That Evades Modern Security Techniques
ChatGPT Can Generate Mutating Malware That Evades Modern Security Techniques
read more
ChatGPT Can Generate Mutating Malware That Evades Modern Security Techniques
ChatGPT Can Generate Mutating Malware That Evades Modern Security Techniques
read more
Bitdefender Anomaly Detection Finds 60k Apps Secretly Installing Adware
Bitdefender Anomaly Detection Finds 60k Apps Secretly Installing Adware
read more
ChatGPT Can Generate Mutating Malware That Evades Modern Security Techniques
ChatGPT Can Generate Mutating Malware That Evades Modern Security Techniques
read more
ChatGPT May Create Deadly Polymorphic Malware That Evades EDR
ChatGPT May Create Deadly Polymorphic Malware That Evades EDR
read more
A New Magecart Credit Card Stealing Campaign Is Making The Rounds
A New Magecart Credit Card Stealing Campaign Is Making The Rounds
read more
Heard At RSAC 2023 - Protecting the Protectors
Heard At RSAC 2023 - Protecting the Protectors
read more
Identity Management and Information Security News for the Week of June 2: HYAS Infosec Wins 2023 Fortress Cybersecurity Award for Threat Intelligence
Identity Management and Information Security News for the Week of June 2: HYAS Infosec Wins 2023 Fortress Cybersecurity Award for Threat Intelligence
read more
Watering Hole Attack Targets Shipping And Logistics Firms
Watering Hole Attack Targets Shipping And Logistics Firms
read more
SMBs Targeted By State-Aligned Actors Through Their MSPs: Proofpoint
SMBs Targeted By State-Aligned Actors Through Their MSPs: Proofpoint
read more
A Screw Up By ASUS Knocked A Bunch Of Their Routers Offline For A Couple Of Days
A Screw Up By ASUS Knocked A Bunch Of Their Routers Offline For A Couple Of Days
read more
20 Ways to Ensure Security Remains/Becomes Everyone’s Responsibility
20 Ways to Ensure Security Remains/Becomes Everyone’s Responsibility
read more
Clouds Of Logs: An Evolving Malware Data Collective Marketplace
Clouds Of Logs: An Evolving Malware Data Collective Marketplace
read more
Victoria-based Cybersecurity Firm HYAS Infosec Wins Cybertech 100 Award
Victoria-based Cybersecurity Firm HYAS Infosec Wins Cybertech 100 Award
read more
IT NERD'S Review: HYAS Protect At Home
IT NERD'S Review: HYAS Protect At Home
read more
Marketplace - HYAS Wins CyberTech 100 Award
Marketplace - HYAS Wins CyberTech 100 Award
read more
HYAS Infosec Wins 2023 Fortress Cybersecurity Award
HYAS Infosec Wins 2023 Fortress Cybersecurity Award
read more
HYAS Wins CyberTech 100 Award
HYAS Wins CyberTech 100 Award
read more
Cybersecurity Faces a Challenge from Artificial Intelligence’s Rise
Cybersecurity Faces a Challenge from Artificial Intelligence’s Rise
read more
MSSP Market News – May 9, 2023
MSSP Market News – May 9, 2023
read more
HYAS Protective DNS Substantially Outperforms All Other Services Tested Via An Independent Test
HYAS Protective DNS Substantially Outperforms All Other Services Tested Via An Independent Test
read more
Independent Testing Institute Finds HYAS Protective DNS Substantially Outperforms All Other Services Tested
Independent Testing Institute Finds HYAS Protective DNS Substantially Outperforms All Other Services Tested
read more
DNS Provider HYAS Infosec Delivers Partner Program
DNS Provider HYAS Infosec Delivers Partner Program
read more
HYAS, RSM Partner to Preemptively Protect Clients Via Protective DNS
HYAS, RSM Partner to Preemptively Protect Clients Via Protective DNS
read more
HYAS Infosec Announces Onpoint Partner Program
HYAS Infosec Announces Onpoint Partner Program
read more
HYAS Infosec Announces Onpoint Partner Program
HYAS Infosec Announces Onpoint Partner Program
read more
LOBSHOT’s hVNC Malware Allows Total Access To Windows Devices
LOBSHOT’s hVNC Malware Allows Total Access To Windows Devices
read more
HYAS Infosec Announces Onpoint Partner Program Targeting Advanced Adversary Infrastructure Intelligence and Detection Market Opportunity
HYAS Infosec Announces Onpoint Partner Program Targeting Advanced Adversary Infrastructure Intelligence and Detection Market Opportunity
read more
Russian Hackers Killnet Executed a Cyber Attack on European Air Traffic Control Agency Eurocontrol
Russian Hackers Killnet Executed a Cyber Attack on European Air Traffic Control Agency Eurocontrol
read more
Crowdstrike Encourages The Use Of AI To Target Malwareless Attacks
Crowdstrike Encourages The Use Of AI To Target Malwareless Attacks
read more
Business Briefing: Products, Services, and Solutions.
Business Briefing: Products, Services, and Solutions.
read more
Google Announces Sec-PaLM Which Is An AI Workbench For Security
Google Announces Sec-PaLM Which Is An AI Workbench For Security
read more
HYAS Sweeps Global InfoSec Awards with Eight Wins at RSA 2023 Conference
HYAS Sweeps Global InfoSec Awards with Eight Wins at RSA 2023 Conference
read more
Ukraine at D+421: Reviewing the cyber phases of Russia's hybrid war.
Ukraine at D+421: Reviewing the cyber phases of Russia's hybrid war.
read more
HYAS Protect At Home Gives Cybersecurity Professionals Free, Best-in-Class Protective DNS To Prevent, Thwart Attacks on Home Networks
HYAS Protect At Home Gives Cybersecurity Professionals Free, Best-in-Class Protective DNS To Prevent, Thwart Attacks on Home Networks
read more
HYAS Introduces HYAS Protect At Home Protective DNS Service
HYAS Introduces HYAS Protect At Home Protective DNS Service
read more
Phishing Kits And AI Tools Fuel Surge In Phishing Campaigns
Phishing Kits And AI Tools Fuel Surge In Phishing Campaigns
read more
RSAC Fireside Chat: ‘Protective DNS’ directs smart audits, automated remediation to IP addresses
RSAC Fireside Chat: ‘Protective DNS’ directs smart audits, automated remediation to IP addresses
read more
CyberWire Newsletter Highlights HYAS Momentum Release
CyberWire Newsletter Highlights HYAS Momentum Release
read more
The CyberWire Daily Briefing: Marketplace V12 Issue 71
The CyberWire Daily Briefing: Marketplace V12 Issue 71
read more
HYAS Reports on Rapid Growth, Driven by Market’s Demand to Block Malware at the Network Level
HYAS Reports on Rapid Growth, Driven by Market’s Demand to Block Malware at the Network Level
read more
ChatGPT and cybersecurity: Data breaches, system vulnerabilities and malicious use
ChatGPT and cybersecurity: Data breaches, system vulnerabilities and malicious use
read more
Microsoft Now Requires Number Matching To Combat MFA Fatigue Attacks
Microsoft Now Requires Number Matching To Combat MFA Fatigue Attacks
read more
Malicious Keylogger Malware Made Using ChatGPT
Malicious Keylogger Malware Made Using ChatGPT
read more
Phishing Emails Are Not Only Increasing, But Are More Dangerous Too.
Phishing Emails Are Not Only Increasing, But Are More Dangerous Too.
read more
Ferrari confirms extortion attempt, but car maker refuses to pay ransom
Ferrari confirms extortion attempt, but car maker refuses to pay ransom
read more
The Register includes BlackMamba in it's Recap of the Week
The Register includes BlackMamba in it's Recap of the Week
read more
ChatGPT Powered Malware Bypasses EDR
ChatGPT Powered Malware Bypasses EDR
read more
BlackMamba PoC Malware Uses AI to Avoid Detection
BlackMamba PoC Malware Uses AI to Avoid Detection
read more
AI-Generated Malware Represent a ‘New Breed of Cyber Threats’
AI-Generated Malware Represent a ‘New Breed of Cyber Threats’
read more
Proof-of-concept: BlackMamba AI-developed malware.
Proof-of-concept: BlackMamba AI-developed malware.
read more
Beware! AI Generates a Truly Polymorphic Malware BlackMamba
Beware! AI Generates a Truly Polymorphic Malware BlackMamba
read more
“Tool Bloat” Slows Cloud Threat Capabilities for Organizations
“Tool Bloat” Slows Cloud Threat Capabilities for Organizations
read more
AI-Powered 'BlackMamba' Keylogging Attack Evades Modern EDR Security
AI-Powered 'BlackMamba' Keylogging Attack Evades Modern EDR Security
read more
BlackMamba: Using AI to Generate Polymorphic Malware
BlackMamba: Using AI to Generate Polymorphic Malware
read more
The CyberWire Daily Briefing 3.8.23 - Attacks, Threats, and Vulnerabilities
The CyberWire Daily Briefing 3.8.23 - Attacks, Threats, and Vulnerabilities
read more
BlackMamba: Using AI to Generate Polymorphic Malware
BlackMamba: Using AI to Generate Polymorphic Malware
read more
HYAS issues POC of BlackMamba AI-based polymorphic malware
HYAS issues POC of BlackMamba AI-based polymorphic malware
read more
David Ratner shares his expertise on diagnosing a company's real problems
David Ratner shares his expertise on diagnosing a company's real problems
read more
How Can Disrupting DNS Communications Thwart a Malware Attack?
How Can Disrupting DNS Communications Thwart a Malware Attack?
read more
Why Monitoring Flow Data Means You’re Only Seeing Half the Picture
Why Monitoring Flow Data Means You’re Only Seeing Half the Picture
read more
Why anomalies in network traffic are key to cybersecurity [Q&A]
Why anomalies in network traffic are key to cybersecurity [Q&A]
read more
CyberNews - Best Threat Intelligence Solutions: our top picks
CyberNews - Best Threat Intelligence Solutions: our top picks
read more
HYAS Joins International Legal Technology Association as a Silver Sponsor to Bring Proactive Cybersecurity Solutions to the Legal Industry
HYAS Joins International Legal Technology Association as a Silver Sponsor to Bring Proactive Cybersecurity Solutions to the Legal Industry
 
HYAS in Solutions Review Endpoint Security and Network Monitoring News
HYAS in Solutions Review Endpoint Security and Network Monitoring News
read more
HYAS Infosec Announces General Availability of Cybersecurity Solution for Production Environments
HYAS Infosec Announces General Availability of Cybersecurity Solution for Production Environments
read more
HYAS Unveils New Tool for Continuous DNS Monitoring
HYAS Unveils New Tool for Continuous DNS Monitoring
read more
The Key to Preventing Production Network Attacks Is to Start Looking Within
The Key to Preventing Production Network Attacks Is to Start Looking Within
read more
The Key to Preventing Production Network Attacks Is to Start Looking Within
The Key to Preventing Production Network Attacks Is to Start Looking Within
read more
Growing Tech Fast Podcast Interview with David Ratner
Growing Tech Fast Podcast Interview with David Ratner
read more
HYAS Infosec Launches First Cybersecurity Solution Specifically for Production Networks
HYAS Infosec Launches First Cybersecurity Solution Specifically for Production Networks
read more
HYAS brings security threat detection, response to production networks
HYAS brings security threat detection, response to production networks
read more
Investment in Product Development and Increased Hiring at HYAS Reinforces Mission to Advance Cybersecurity
Investment in Product Development and Increased Hiring at HYAS Reinforces Mission to Advance Cybersecurity
read more
Repelling A Ransomware Attack: David Ratner Shares Five Tips
Repelling A Ransomware Attack: David Ratner Shares Five Tips
read more
How Security Technology Enables the Digital Workplace
How Security Technology Enables the Digital Workplace
read more
Techstrong TV Interviews HYAS CTO David Mitchell About DNS Monitoring
Techstrong TV Interviews HYAS CTO David Mitchell About DNS Monitoring
read more
average intrusion remains undetected in enterprise networks for 99 days
average intrusion remains undetected in enterprise networks for 99 days
read more
A look at what to expect in the cybersecurity world in 2022
A look at what to expect in the cybersecurity world in 2022
read more
Why companies need to pair zero-trust with enhanced visibility
Why companies need to pair zero-trust with enhanced visibility
read more
Companies need to combine a more proactive cyber approach with zero-trust
Companies need to combine a more proactive cyber approach with zero-trust
read more
Cybersecurity Is Broken: How We Got Here & How to Start Fixing It
Cybersecurity Is Broken: How We Got Here & How to Start Fixing It
read more
Going Back to Basics to Fix Our Broken Approach to Cybersecurity
Going Back to Basics to Fix Our Broken Approach to Cybersecurity
read more
HYAS Announces Rebrand to Highlight Leading Innovations and Solutions in Cybersecurity
read more
HYAS Named 2021 TAG Cyber Distinguished Vendor
HYAS Named 2021 TAG Cyber Distinguished Vendor
 
HYAS Recognized Among CyberTech100 for Helping Financial Institutions Combat Cyber Threats and Fraud
HYAS Recognized Among CyberTech100 for Helping Financial Institutions Combat Cyber Threats and Fraud
 
Dcode Features HYAS In New Tech Report For U.S. Federal Market
Dcode Features HYAS In New Tech Report For U.S. Federal Market
 
HYAS Protect Integrates with Microsoft Defender for Endpoint to Enhance Enterprise Security
HYAS Protect Integrates with Microsoft Defender for Endpoint to Enhance Enterprise Security
read more
HYAS Closes $16 Million Series B Funding Round Led by S3 Ventures for Cyberattack Intercept Technology
HYAS Closes $16 Million Series B Funding Round Led by S3 Ventures for Cyberattack Intercept Technology
read more
News Advisory: HYAS Infosec Reveals Key Details on Attacker and Infrastructure Behind SolarWinds Orion Compromise
News Advisory: HYAS Infosec Reveals Key Details on Attacker and Infrastructure Behind SolarWinds Orion Compromise
 
HYAS Joins the Microsoft Intelligent Security Association (MISA), integrates HYAS Insight with Microsoft Azure Sentinel
HYAS Joins the Microsoft Intelligent Security Association (MISA), integrates HYAS Insight with Microsoft Azure Sentinel
read more
HYAS Protect Achieves General Availability To Preempt Cyber Attacks
HYAS Protect Achieves General Availability To Preempt Cyber Attacks
read more
HYAS Appoints Jonathan Candee as Senior Vice President for Global Sales
HYAS Appoints Jonathan Candee as Senior Vice President for Global Sales
read more
HYAS Insight and King & Union Avalon Cyber Analysis Platform Integrate To Speed Cybersecurity Investigations
HYAS Insight and King & Union Avalon Cyber Analysis Platform Integrate To Speed Cybersecurity Investigations
 
HYAS Launches ThreatConnect Integration
HYAS Launches ThreatConnect Integration
read more
HYAS Moves to Further Develop Federal Market Presence
HYAS Moves to Further Develop Federal Market Presence
 
HYAS Launches Insight Threat Intelligence Solution for Investigation and Attribution
HYAS Launches Insight Threat Intelligence Solution for Investigation and Attribution
read more
HYAS Recognized as a Microsoft Security 20/20 Partner Awards Finalist for Emerging ISV Disruptor
HYAS Recognized as a Microsoft Security 20/20 Partner Awards Finalist for Emerging ISV Disruptor
read more
HYAS Named 2020 TAG Cyber Distinguished Vendor
HYAS Named 2020 TAG Cyber Distinguished Vendor
read more
HYAS Adds Infosec Visionary Ariel Silverstone as Data Protection Officer, Secures Funding From Susa Ventures
read more
Cybersecurity Pioneer HYAS Raises $6.2M Series A Round Led By M12
Cybersecurity Pioneer HYAS Raises $6.2M Series A Round Led By M12
read more
load more +

threat reports

listing image

Protecting Yourself from Malicious Browser Extensions

Kell van Daal
read more
listing image

Lazarus Group “Operation Dream Job”: Lessons in Attack Infrastructure

HYAS Intel Team HYAS Intel Team
read more
Ryuk crypto ledger and asian crypto traders

Inside Ryuk Crime (Crypto) Ledger & Asian Crypto Traders

HYAS Intel Team HYAS Intel Team
read more