All Research Sponsored By:Eclypses

Why You Should Be Concerned About Quantum Computing
WHITE PAPER: This white paper explains why you should be concerned about the coming future of quantum computing and what you can do to protect yourself. Access the white paper.
Posted: 11 Jan 2023 | Published: 12 Jan 2023

TOPICS:  .NET

5 Trends in Mobile App Security for 2023
BLOG: According to a recent study, 77% of financial apps were found having at least one vulnerability that could lead to a data breach. As these applications are increasingly entrusted with personal information, it is critical that mobile security keeps pace. Read now to unlock 5 key trends currently shaping the mobile app security landscape.
Posted: 21 Dec 2022 | Published: 22 Dec 2022

TOPICS:  .NET

5 Key Tips to Prepare for the Next Zero-Day Attack
BLOG: Zero-day attacks are happening at the highest rate in history. Fortunately, there are many prevention solutions available that can defend against these persistent and creative attacks. Read this blog to access 5 key tips to prepare for the next zero-day attack.
Posted: 16 Nov 2022 | Published: 16 Nov 2022

TOPICS:  .NET

Why Wouldn’t You Have Redundancy in Your Data Security?
BLOG: As cybercriminals find new ways of exploiting vulnerabilities, it is becoming more apparent that no single system is perfect. In order to overcome this difficulty, organizations are proactively building layered security systems that, while redundant, are better prepared to cover newly discovered vulnerabilities. Continue reading to discover more.
Posted: 26 Oct 2022 | Published: 26 Oct 2022

TOPICS:  .NET

Regulatory Compliance in Data Security
BLOG: While there are many benefits resulting from regulatory compliance, managing the transition is always a nerve-racking process. This blog presents an Interview with Eclypses’ Director of Customer Success on how MTE technology can keep your data protected and keeps your organization ahead of regulatory changes in your industry. Read on to learn more.
Posted: 25 Oct 2022 | Published: 25 Oct 2022

TOPICS:  .NET

Unauthorized Access Vulnerability on Teslas | How Could This Be Prevented in the Future?
BLOG: Relay attacks occur when a hacker intercepts data as it is being transmitted and replaces it with false data intended to deceive the receiver. A group of hackers recently used this type of attack to manipulate the keyless entry feature of Tesla automobiles. Read this blog to learn about MTE technology and how it could future attacks.
Posted: 22 Oct 2022 | Published: 22 Oct 2022

TOPICS:  .NET

DevSecOps and Eclypses MTE® Technology
WHITE PAPER: Where in the past application security was seen as a wholly separate element, it is now fully incorporated into the development process, evolving alongside the application itself. This white paper looks at the state of DevSecOps and analyzes how Eclypses MTE Technology can provide better application security. Continue reading to learn more.
Posted: 13 Oct 2022 | Published: 14 Oct 2022

TOPICS:  .NET

Credential Stuffing Attacks: How to Protect Your Web App from Bots
BLOG: According to a recent survey, 65% of people use the same password on multiple accounts. This trend allows cybercriminals to use stolen credentials to access accounts on other systems, making up nearly half of all login requests on certain platforms. Learn how to protect your web app from these credential stuffing attacks in this blog.
Posted: 01 Oct 2022 | Published: 01 Oct 2022

TOPICS:  .NET

Next Generation of Best Practices in Data Security
WHITE PAPER: This white paper from Eclypses details a list of future cyber threats provided by industry experts and what best practices you should consider for protecting your data today and into the future. Access the white paper here.
Posted: 30 Sep 2022 | Published: 30 Sep 2022

TOPICS:  .NET

Online Gambling Platform Breaches
WHITE PAPER: An era of digital transformation has incentivized increased financial activity on online platforms, but they can be vulnerable to authentication breaches. Discover recent cyberattacks targeted towards online platforms and what you can do to prevent the same from happening to your company in this white paper.
Posted: 12 Aug 2022 | Published: 12 Aug 2022

TOPICS:  .NET

How Vulnerable are Your Systems to a Brute Force Attack?
WHITE PAPER: For those unaware, a brute force cyberattack is when a hacker repeats encryption keys a multitude of times until they gain access. It seems simple, but it has been effective for years. If you are concerned that your employees do not practice password security, then you may be at risk. Read on to learn more about the process and see if you’re ready.
Posted: 12 Aug 2022 | Published: 12 Aug 2022

TOPICS:  .NET

The Security Flaws Leaving Financial Mobile Applications Vulnerable
WHITE PAPER: In the financial services sector, the number of cyber risks is huge. While this is not new information, you would be surprised to know that while most have secure apps and networks, but a very large number do not shield their mobile apps. According to one study, almost 77% of financial apps have some kind of vulnerability. Read on to learn more.
Posted: 12 Aug 2022 | Published: 12 Aug 2022

TOPICS:  .NET

MTE TECHNOLOGY: The Compact Solution to Safeguard IoT Data
WHITE PAPER: The rise of smart devices and connected hardware has seen explosive growth. In 2019 alone, 26 billion IoT devices were activated which can produce 800 zettabytes of data, most of which is sensitive. With that kind of data out there, organizations must act to protect their own IoT data. Read on to learn more about MTE technology and how it can help.
Posted: 12 Aug 2022 | Published: 12 Aug 2022

TOPICS:  .NET

Implications Towards Businesses from a Cybersecurity Lens
WHITE PAPER: Cyberspace is full of menacing cyberattacks that can severely disrupt and compromise businesses and customers. Government agencies are directing regulations aimed at improving the security posture of companies. This paper explains how these regulations affect the business sector and what companies can do to defend their assets from bad actors.
Posted: 12 Aug 2022 | Published: 12 Aug 2022

TOPICS:  .NET

Contactless ATM Processing – Protecting The Communication With MTE Technology
PRODUCT OVERVIEW: One of the newer Fintech technologies is contactless ATM processing. However, this method has some vulnerabilities that expose data to adversaries. That’s why Eclypses created MTE Technology that secures data as it is passed between application, ATM, and the issuing bank. Access this product brief to learn more.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TOPICS:  .NET

The Kroger Company Data Breach Affects About 3.8 Million Individuals
CASE STUDY: The supermarket chain Kroger operates hundreds of supermarkets and department stores throughout the United States. While they happily serve millions of customers, their file transfer platform that managed their pharmacy department and money wiring services were hacked. Read on to find out more about this incident and how they recovered.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TOPICS:  .NET

Online Gaming Platform Breaches
CASE STUDY: Recent online gaming platform breaches are exposing how hackers access private networks and information by getting around authentication processes. Learn how Eclypses MTE technology can prevent this with instantly obsolete transmissions in this case study.
Posted: 09 Aug 2022 | Published: 09 Aug 2022

TOPICS:  .NET

NFT Game Wonderhero Is Disabled After Hackers Stole $320K In Cryptocurrency
CASE STUDY: Read this case study to learn how an NFT game lost $320K in cryptocurrency and what you can do to defend your organization against similar cyberattacks.
Posted: 06 Aug 2022 | Published: 06 Aug 2022

TOPICS:  .NET

Customers’ License Numbers Stolen In Geico Insurance Hack
CASE STUDY: According to Forbes, Geico suffered a data breach in which their large numbers of their customers had their license information stolen. By using encryption, as well as isolated endpoint protection, MTE Technology has the potential to prevent future attacks like the one suffered by Geico. Access the full case study to learn more.
Posted: 06 Aug 2022 | Published: 06 Aug 2022

TOPICS:  .NET

Customers’ Data Stolen In Metromile Car Insurance Hack
CASE STUDY: Metromile suffered from a data breach resulting in many of their customers’ data being stolen by hackers. Eclypses MTE Technology aims to prevent attacks like this from happening again, by providing a secure encryption that wouldn’t have allowed the hackers to access the information they had stolen. Read the full case study to learn more.
Posted: 06 Aug 2022 | Published: 16 Aug 2022

TOPICS:  .NET

Samsung Breach: Hacker Group, Lapsus$ Steals Source Code
CASE STUDY: When the cybercriminal syndicate known as Lapsus$ stole source code, Samsung was not prepared to deal with the fallout of the data breach. In this case study, Eclypses argues for how their MTE Technology offering could have aided Samsung through the difficult episode. Access the full case study to learn more about Eclypses MTE Technology.
Posted: 05 Aug 2022 | Published: 05 Aug 2022

TOPICS:  .NET

Hacker Stole $625M From Ronin Bridge, The Blockchain Behind NFT Game Axie Infinity
CASE STUDY: When $625 million worth of cryptocurrency was stolen from Ronin, the blockchain behind the popular crypto game Axie Infinity, the industry was shaken to its core. Eclypses MTE Technology could prevent future attacks by using unique endpoint pairings as verification, so that hackers can’t remotely access a user’s wallet. Read on to learn more.
Posted: 03 Aug 2022 | Published: 03 Aug 2022

TOPICS:  .NET