Security
Blockchain, Security, Video Games,
NFTs & Blockchain in the Gaming Industry
With our previous work on games and applications based on the blockchain, we thought it would be good to talk about it! With their growing popularity, let’s dive into blockchain, NFTs, and smart contracts. We’ll talk about what they are, why they’re trending, and the security measures to consider in this evolving digital marketplace. If you’d like to learn more ...
1 July 2021
Security, Video Games,
Security Explained: Eyes-on Oculus
With VR headsets becoming more and more available, our engineers decided to see what the security is like on the Oculus systems. Back when we started hacking and conducting penetration tests, things were much easier. Nobody knew about security, nobody took it seriously. With the rise of VR popularity, we wanted to make sure this mentality hadn’t maintained across several ...
24 June 2021
Security, Video Games,
Security Explained: Fear the Peer-to-Peer
Peer-to-peer or P2P is a method of connecting players during gameplay. Security without sacrificing performance is a key goal for us at Cyrex. It’s our modus operandi, our driving force when it comes to conducting security testing. P2P networking is a cost-effective alternative. However, we’ve noticed a lack of knowledge regarding its vulnerability to malicious actors. Dedicated Server There are ...
16 June 2021
Security,
Security Explained: Unity Zero-Day Vulnerability
Recently, our security engineers were conducting penetration tests on a partner’s multiplayer game. They discovered something a little unusual. Upon following it to its source, they found that it wasn’t a game vulnerability. Instead, it was a vulnerability in the multiplayer Unity service. What is the Unity Multiplayer Service? As one of the most accessible and industry-leading engines, Unity offers ...
10 June 2021
Security,
Security Explained: Penetration Testing Models
When it comes to penetration testing, there are multiple avenues of engagement. Traditionally, there are three models that would be used. In a continued effort to take some of the mysticism and confusion out of the topic, we’d like to lay these three out plainly. Penetration Testing Engagement When someone needs to go about getting their application or system’s security ...
3 June 2021
Security, Load Testing,
Load Testing with Cyrex Swarm
When it comes to load testing, you’ve only got a few options. Do it yourself, hire a company to do it for you, or skip it and hope it works out. The first one costs significant development time and resources. The second costs resources and is limited by the number of virtual machines they can run. And the third, well, ...
27 May 2021
Security,
Cyrex CSP: Best of Both Worlds
When it comes to cybersecurity testing, you have two choices. There is the bug bounty approach and the penetration testing route. While these both have their own unique strengths and weaknesses, the team at Cyrex aren’t one to sit idle, having recently launched a new program for indie developers. To continue that push, we’re now offering the Cyrex Cybersecurity Program ...
20 May 2021
Security, Blockchain,
Working with Jigstack
Earlier this year, we collaborated with the team at Jigstack for a full penetration and load test of their services. For those of you unfamiliar with Jigstack, they have been called the “Microsoft of Decentralised Finance.” Jigstack is a decentralised autonomous organisation (DAO) who govern a portfolio of Ethereum network assets and protocols. Any assets deployed into Jigstack are, as ...
13 May 2021
Security, Blockchain, News,
The Jigstack — Cyrex Partnership
Cyrex joins forces with Jigstack to further enhance security through penetration testing Earlier this year, Jigstack collaborated with the team at Cyrex for a full penetration and load test of our services, including the Lemonade platform. For those of you unfamiliar with Cyrex they are a company that specializes in secure software development and application penetration testing. They are a ...
6 May 2021