It’s Award Season, Again

It’s Award Season, Again

| | Blog, FEATURED
As CEO, I couldn’t be more proud of the entire HYAS team. Because of their hard work, and dedication to protecting the industry from cyber threats, our company was just recognized with ...
Lottie Player compromised in supply chain attack — all you need to know

Lottie Player compromised in supply chain attack — all you need to know

Popular JavaScript library and npm package Lottie Player was compromised in a supply chain attack with threat actors releasing three new versions of the component yesterday, all in a span of a ...
A vintage military jeep, offering uninterrupted access to adventure, is parked next to a large canvas tent on a barren landscape under a blue sky with clouds.

Resilience in extreme conditions: Why DDIL environments need continuous identity access

| | FEATURED, Identity Continuity
Ensuring seamless operations in even the harshest environments is a necessity today. For organizations operating within the Department of Defense (DoD) space, identity resilience and continuity are essentially non-negotiable — as the ...
10 years of software supply chains: Navigating the growth, risks, and future of open source

10 years of software supply chains: Navigating the growth, risks, and future of open source

Reflecting on 10 years of the State of the Software Supply Chain report is both a milestone and a call to action. Over the past decade, the world of software development has ...
Masamune: The Smart Contract Security Search Tool

Masamune: The Smart Contract Security Search Tool

Zellic is proud to announce Masamune, a curated index of audit reports, bug fixes, and technical documentation of numerous protocols ...
Circular diagram depicting the NIST Cybersecurity Framework 2.0 with five sections: Identify, Protect, Detect, Respond, Recover, and Govern, surrounding a central core labeled "NIST Cybersecurity Framework," ensuring uninterrupted access to critical information systems.

How The NIST Cybersecurity Framework is enhanced by Identity Continuity

| | FEATURED, Identity Continuity
As recent events have shown, our technology systems are so connected that any interruption can cause global chaos. Organizations need robust defenses to protect their data and operations, and it starts with ...
Web3 Ping of Death: Finding and Fixing a Chain-Halting Vulnerability in NEAR

Web3 Ping of Death: Finding and Fixing a Chain-Halting Vulnerability in NEAR

| | FEATURED, hacks
A look into how Zellic identified and helped fix a vulnerability in NEAR Protocol ...
DNS Security: A Key Component of Network Resiliency

DNS Security: A Key Component of Network Resiliency

| | Blog, FEATURED
DNS security is critical to network resiliency, particularly in blocking command and control servers.  Cybersecurity platform HYAS’s proprietary algorithms have the ability to quickly understand new infrastructure and connections, allowing for proactive ...
Text reading "The A's of identity and access management" is displayed next to a diagram with icons connected to a central hexagon representing various digital security elements, ensuring uninterrupted access.

Understanding the 7 A’s of IAM

How the seven functions of IAM power identity-first security Today’s corporate security architecture is built on the cornerstone of identity and access management (IAM). And seven underlying functions, all beginning with the ...
How One Canadian Credit Union Uses HYAS To Combat Fraud

How One Canadian Credit Union Uses HYAS To Combat Fraud

| | Blog, FEATURED
One HYAS client, a leading Canadian credit union, is a constant target of cybercrime. However, since integrating HYAS intelligence into its tech stack, its threat response has dramatically improved.  This credit union ...