Far From Random: Three Mistakes From Dart/Flutter's Weak PRNG

Far From Random: Three Mistakes From Dart/Flutter’s Weak PRNG

A look into how an unexpectedly weak PRNG in Dart led to Zellic's discovery of multiple vulnerabilities ...
The Value of Unique Data for Threat Intel

The Value of Unique Data for Threat Intel

| | Blog, FEATURED
Let’s face it – researching an existing threat or fraud case is not an easy or straightforward task. Bad actors and criminals are getting better at obfuscating their attack infrastructure and overall ...
A sleek desktop computer setup featuring a monitor displaying code and a tower with colorful DDIL-branded fans, accompanied by neatly arranged cables and headphones resting on the desk.

IAM tech debt: Balancing modernization and legacy identity infrastructure

“As enterprises modernize their identity systems to keep pace with multi-cloud strategies, they find themselves in a quagmire of technical debt, complexity, and resource constraints.” – State of Multi-Cloud Identity Report 2025 Technical ...
It’s Award Season, Again

It’s Award Season, Again

| | Blog, FEATURED
As CEO, I couldn’t be more proud of the entire HYAS team. Because of their hard work, and dedication to protecting the industry from cyber threats, our company was just recognized with ...
Lottie Player compromised in supply chain attack — all you need to know

Lottie Player compromised in supply chain attack — all you need to know

Popular JavaScript library and npm package Lottie Player was compromised in a supply chain attack with threat actors releasing three new versions of the component yesterday, all in a span of a ...
A vintage military jeep, offering uninterrupted access to adventure, is parked next to a large canvas tent on a barren landscape under a blue sky with clouds.

Resilience in extreme conditions: Why DDIL environments need continuous identity access

| | FEATURED, Identity Continuity
Ensuring seamless operations in even the harshest environments is a necessity today. For organizations operating within the Department of Defense (DoD) space, identity resilience and continuity are essentially non-negotiable — as the ...
10 years of software supply chains: Navigating the growth, risks, and future of open source

10 years of software supply chains: Navigating the growth, risks, and future of open source

Reflecting on 10 years of the State of the Software Supply Chain report is both a milestone and a call to action. Over the past decade, the world of software development has ...
Masamune: The Smart Contract Security Search Tool

Masamune: The Smart Contract Security Search Tool

Zellic is proud to announce Masamune, a curated index of audit reports, bug fixes, and technical documentation of numerous protocols ...
Web3 Ping of Death: Finding and Fixing a Chain-Halting Vulnerability in NEAR

Web3 Ping of Death: Finding and Fixing a Chain-Halting Vulnerability in NEAR

| | FEATURED, hacks
A look into how Zellic identified and helped fix a vulnerability in NEAR Protocol ...
DNS Security: A Key Component of Network Resiliency

DNS Security: A Key Component of Network Resiliency

| | Blog, FEATURED
DNS security is critical to network resiliency, particularly in blocking command and control servers.  Cybersecurity platform HYAS’s proprietary algorithms have the ability to quickly understand new infrastructure and connections, allowing for proactive ...