Special Bulletin: US Election Phishing Alert

Special Bulletin: US Election Phishing Alert

| | Blog, FEATURED
Threat Intelligence Report Date: August 28, 2024 Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS As the US election approaches, the surge in political activity and heightened public interest make ...
HYAS Achieves SOC 2 Type II Certification

HYAS Achieves SOC 2 Type II Certification

| | Blog, FEATURED
As the CEO of HYAS Infosec, I am thrilled to share a significant milestone in our commitment to data security: our successful completion of the System and Organization Controls (SOC) 2 Type ...
Why We Acquired Code4rena

Why We Acquired Code4rena

How Zellic's acquisition of Code4rena benefits you ...
Echoes of Rome: Leveraging Ancient Tactics for Modern Malware

Echoes of Rome: Leveraging Ancient Tactics for Modern Malware

| | Blog, FEATURED
Threat Intelligence Report Date: August 19, 2024 Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS This year, the HYAS Threat Intelligence team has been tracking the use of the Steam ...
A Gap in the Armor: What Was Missing from Black Hat 2024

A Gap in the Armor: What Was Missing from Black Hat 2024

| | Blog, FEATURED
Along with 30,000+ of my closest friends, HYAS participated in both the Black Hat 2024 cyber security conference and others last week in Las Vegas.  There have been a lot of articles ...
Clash of the Titans (2010) - Release the Kraken! Scene (8/10) | Movieclips

Happenings from Black Hat 2024

| | Blog, FEATURED
The annual Black Hat USA conference in Las Vegas once again lived up to my expectations as one of the premier events in cybersecurity. The conference attracts just the right mix of ...
NIST Announces the First 3 Post-Quantum Cryptography Standards – Ready or Not?

NIST Announces the First 3 Post-Quantum Cryptography Standards – Ready or Not?

The Wait is Over. It’s Ready, Set, Go for PQC Migration! After 8 long years of rigorous research and relentless effort, the U.S. National Institute of Standards and Technology (NIST) has released ...
HYAS Investigates Threat Actors Hidden In Gaming Services

HYAS Investigates Threat Actors Hidden In Gaming Services

| | Blog, FEATURED
Threat Intelligence Report Date: August 12, 2024 Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS Threat Actors Exploiting Legitimate Services to Disguise TrafficRecently, the HYAS Threat Intelligence team has noticed ...
Why Governments Worldwide Recommend Protective DNS

Why Governments Worldwide Recommend Protective DNS

| | Blog, FEATURED
HYAS Protect protective DNS uses advanced data analytics to proactively block cyber threats, a feature unavailable in legacy systems relying on static DNS filtering. AV-TEST, one of the cybersecurity industry’s most trusted ...
The Prevalence of DarkComet in Dynamic DNS

The Prevalence of DarkComet in Dynamic DNS

| | Blog, FEATURED
Threat Intelligence Report Date: August 6, 2024 Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS Dynamic DNS (DDNS) is a service that automatically updates the Domain Name System (DNS) in ...

Application Security Check Up