How to Keep Your Crypto Wallet Safe

How to Keep Your Crypto Wallet Safe

| | Blog
 Author: Kell van Daal Rising Crypto Exchange Rates = Rising Threats Though Bitcoin’s value has taken a hit, it is making a gradual comeback after a big slump, almost doubling in value since December. And when Bitcoin (and other crypto currencies) become more valuable, bad actors notice. Threat actors have ... Read More
Smart Tvs require even smarter security measures

Smart Tvs require even smarter security measures

| | Blog
Smart TV Dilemmas It's hard nowadays to find a TV that is not "smart". They all come preloaded with apps to watch Netflix, Disney+ and the like. Not everyone has a new TV though. For older "dumb" TVs, streaming devices are very popular. And even for TVs with built-in apps, ... Read More
Easy as PyPI Pie

Easy as PyPI Pie

| | Blog
Recently PyPI suspended new user sign-ups as well as new project registration, citing the volume of malicious users and malicious projects being created outpacing their ability to respond in a timely fashion. Registrations were closed for a weekend. Python Package Index PyPI is the Python Package Index, a repository of ... Read More
Why We Still Haven’t Learned From the Target Data Breach a Decade Later

Why We Still Haven’t Learned From the Target Data Breach a Decade Later

The threat actor’s methodology wasn’t unique — they used a six-step approach that can be mapped directly to cyber attack frameworks. Most of these steps could’ve been blocked with the aid of DNS protection. With cybercrime at record levels, businesses are on guard against a constantly growing number and variety ... Read More
Protecting Yourself from Malicious Browser Extensions Is Easier Than You Think

Protecting Yourself from Malicious Browser Extensions Is Easier Than You Think

| | Blog, Threat Reports
Browser extension-based malware can range from annoying to catastrophic, but following these tips will help keep your home network safe. Few would argue that browser extensions aren't useful. They have the ability to add valuable functionality to your browser (password managers, ad-blocking, automatic translations, etc.), and every major brand has ... Read More
Defeating Malvertising-Based Phishing Attacks

Defeating Malvertising-Based Phishing Attacks

| | Blog, HYAS Labs, Phishing
Malvertising Enters a New Age While Google grapples with the potential threat that ChatGPT poses to its advertising business, cybercriminals are taking advantage of Google Ads to ramp up their phishing attacks on unsuspecting victims. To pull off these scams, phishers purchase ads that appear to represent well-known companies, brands, ... Read More
Threat Actors Are Using Google Ads to Launch Phishing Attacks

Threat Actors Are Using Google Ads to Launch Phishing Attacks

| | Blog, Phishing
Year after year, phishing tops the list of the leading causes of data breaches. Afterall, a threat actor’s job is made much easier if they can get an authorized user to visit a malicious website on their own accord. Once a user has accessed a malicious site, they could potentially ... Read More
Which Protective DNS Keeps You Safest From Cyber Threats? (Part 2)

Which Protective DNS Keeps You Safest From Cyber Threats? (Part 2)

| | Blog, pDNS
In a previous blog, we shared the results of a comparison test that pitted HYAS Protect against three other highly regarded protective DNS providers. To ensure the test’s legitimacy, we used a list of 19,578 domains that we knew were associated with malware or otherwise known to be malicious. Our ... Read More
Putting an End to Emotet: Measuring the Real-World Efficacy of Protective DNS Providers

Putting an End to Emotet: Measuring the Real-World Efficacy of Protective DNS Providers

We compared HYAS with other top protective DNS providers to find out which one was able to detect and block the most domains associated with an Emotet attack. Anyone who is plugged into the cybersecurity world has already heard plenty about Emotet, but that doesn’t make it old news. Check ... Read More
Which Protective DNS Provider Keeps You Safest from Malware and Other Cyber Threats?

Which Protective DNS Provider Keeps You Safest from Malware and Other Cyber Threats?

| | Blog, pDNS, Threat Intelligence
We conducted tests using real-world malicious domains to evaluate the efficacy of HYAS Protect, along with three other top protective DNS providers It’s well-known in cybersecurity circles that most malicious traffic employs the domain name system (DNS) in some way. For instance, command and control (C2) infrastructure and malware are ... Read More