FEATURED
Far From Random: Three Mistakes From Dart/Flutter’s Weak PRNG
A look into how an unexpectedly weak PRNG in Dart led to Zellic's discovery of multiple vulnerabilities ...
The Value of Unique Data for Threat Intel
Let’s face it – researching an existing threat or fraud case is not an easy or straightforward task. Bad actors and criminals are getting better at obfuscating their attack infrastructure and overall ...
IAM tech debt: Balancing modernization and legacy identity infrastructure
“As enterprises modernize their identity systems to keep pace with multi-cloud strategies, they find themselves in a quagmire of technical debt, complexity, and resource constraints.” – State of Multi-Cloud Identity Report 2025 Technical ...
It’s Award Season, Again
As CEO, I couldn’t be more proud of the entire HYAS team. Because of their hard work, and dedication to protecting the industry from cyber threats, our company was just recognized with ...
Lottie Player compromised in supply chain attack — all you need to know
Popular JavaScript library and npm package Lottie Player was compromised in a supply chain attack with threat actors releasing three new versions of the component yesterday, all in a span of a ...
Resilience in extreme conditions: Why DDIL environments need continuous identity access
Ensuring seamless operations in even the harshest environments is a necessity today. For organizations operating within the Department of Defense (DoD) space, identity resilience and continuity are essentially non-negotiable — as the ...
10 years of software supply chains: Navigating the growth, risks, and future of open source
Reflecting on 10 years of the State of the Software Supply Chain report is both a milestone and a call to action. Over the past decade, the world of software development has ...
Masamune: The Smart Contract Security Search Tool
Zellic is proud to announce Masamune, a curated index of audit reports, bug fixes, and technical documentation of numerous protocols ...
Web3 Ping of Death: Finding and Fixing a Chain-Halting Vulnerability in NEAR
A look into how Zellic identified and helped fix a vulnerability in NEAR Protocol ...
DNS Security: A Key Component of Network Resiliency
DNS security is critical to network resiliency, particularly in blocking command and control servers. Cybersecurity platform HYAS’s proprietary algorithms have the ability to quickly understand new infrastructure and connections, allowing for proactive ...