Security
Video Games, Security,
Webinar Catchup: Art of Online Game Hacking
Recently, our COO and Co-Founder, Mathieu Huysman, held a webinar discussing the ins and outs of online game hacking. In case you missed it, you can find the archived stream below. Otherwise, we thought it would be good to summarise and revisit some key points our expert ethical hacker and cybersecurity specialist touched on. Why do people hack? This is ...
15 July 2021
Video Games, Security,
Gaming Industry Plagued by Hackers
With the recent and very public attacks on several high-profile game companies, we felt it was time to address the topic. There is a worrying lack of modernity in the security of the gaming industry. We have talked about why the games industry would be targeted by hackers. And for many years we have warned that these attacks will only ...
8 July 2021
Blockchain, Security, Video Games,
NFTs & Blockchain in the Gaming Industry
With our previous work on games and applications based on the blockchain, we thought it would be good to talk about it! With their growing popularity, let’s dive into blockchain, NFTs, and smart contracts. We’ll talk about what they are, why they’re trending, and the security measures to consider in this evolving digital marketplace. If you’d like to learn more ...
1 July 2021
Security, Video Games,
Security Explained: Eyes-on Oculus
With VR headsets becoming more and more available, our engineers decided to see what the security is like on the Oculus systems. Back when we started hacking and conducting penetration tests, things were much easier. Nobody knew about security, nobody took it seriously. With the rise of VR popularity, we wanted to make sure this mentality hadn’t maintained across several ...
24 June 2021
Security, Video Games,
Security Explained: Fear the Peer-to-Peer
Peer-to-peer or P2P is a method of connecting players during gameplay. Security without sacrificing performance is a key goal for us at Cyrex. It’s our modus operandi, our driving force when it comes to conducting security testing. P2P networking is a cost-effective alternative. However, we’ve noticed a lack of knowledge regarding its vulnerability to malicious actors. Dedicated Server There are ...
16 June 2021
Security,
Security Explained: Unity Zero-Day Vulnerability
Recently, our security engineers were conducting penetration tests on a partner’s multiplayer game. They discovered something a little unusual. Upon following it to its source, they found that it wasn’t a game vulnerability. Instead, it was a vulnerability in the multiplayer Unity service. What is the Unity Multiplayer Service? As one of the most accessible and industry-leading engines, Unity offers ...
10 June 2021
Security,
Security Explained: Penetration Testing Models
When it comes to penetration testing, there are multiple avenues of engagement. Traditionally, there are three models that would be used. In a continued effort to take some of the mysticism and confusion out of the topic, we’d like to lay these three out plainly. Penetration Testing Engagement When someone needs to go about getting their application or system’s security ...
3 June 2021
Security, Load Testing,
Load Testing with Cyrex Swarm
When it comes to load testing, you’ve only got a few options. Do it yourself, hire a company to do it for you, or skip it and hope it works out. The first one costs significant development time and resources. The second costs resources and is limited by the number of virtual machines they can run. And the third, well, ...
27 May 2021
Security,
Cyrex CSP: Best of Both Worlds
When it comes to cybersecurity testing, you have two choices. There is the bug bounty approach and the penetration testing route. While these both have their own unique strengths and weaknesses, the team at Cyrex aren’t one to sit idle, having recently launched a new program for indie developers. To continue that push, we’re now offering the Cyrex Cybersecurity Program ...
20 May 2021