FEATURED

It’s Award Season, Again
As CEO, I couldn’t be more proud of the entire HYAS team. Because of their hard work, and dedication to protecting the industry from cyber threats, our company was just recognized with ...

Lottie Player compromised in supply chain attack — all you need to know
Popular JavaScript library and npm package Lottie Player was compromised in a supply chain attack with threat actors releasing three new versions of the component yesterday, all in a span of a ...

Resilience in extreme conditions: Why DDIL environments need continuous identity access
Ensuring seamless operations in even the harshest environments is a necessity today. For organizations operating within the Department of Defense (DoD) space, identity resilience and continuity are essentially non-negotiable — as the ...

10 years of software supply chains: Navigating the growth, risks, and future of open source
Reflecting on 10 years of the State of the Software Supply Chain report is both a milestone and a call to action. Over the past decade, the world of software development has ...

Masamune: The Smart Contract Security Search Tool
Zellic is proud to announce Masamune, a curated index of audit reports, bug fixes, and technical documentation of numerous protocols ...

How The NIST Cybersecurity Framework is enhanced by Identity Continuity
As recent events have shown, our technology systems are so connected that any interruption can cause global chaos. Organizations need robust defenses to protect their data and operations, and it starts with ...

Web3 Ping of Death: Finding and Fixing a Chain-Halting Vulnerability in NEAR
A look into how Zellic identified and helped fix a vulnerability in NEAR Protocol ...

DNS Security: A Key Component of Network Resiliency
DNS security is critical to network resiliency, particularly in blocking command and control servers. Cybersecurity platform HYAS’s proprietary algorithms have the ability to quickly understand new infrastructure and connections, allowing for proactive ...

Understanding the 7 A’s of IAM
How the seven functions of IAM power identity-first security Today’s corporate security architecture is built on the cornerstone of identity and access management (IAM). And seven underlying functions, all beginning with the ...

How One Canadian Credit Union Uses HYAS To Combat Fraud
One HYAS client, a leading Canadian credit union, is a constant target of cybercrime. However, since integrating HYAS intelligence into its tech stack, its threat response has dramatically improved. This credit union ...