All Research Sponsored By:Eclypses

NFT Game Wonderhero Is Disabled After Hackers Stole $320K In Cryptocurrency
CASE STUDY: Read this case study to learn how an NFT game lost $320K in cryptocurrency and what you can do to defend your organization against similar cyberattacks.
Posted: 06 Aug 2022 | Published: 06 Aug 2022

TOPICS:  .NET

Customers’ License Numbers Stolen In Geico Insurance Hack
CASE STUDY: According to Forbes, Geico suffered a data breach in which their large numbers of their customers had their license information stolen. By using encryption, as well as isolated endpoint protection, MTE Technology has the potential to prevent future attacks like the one suffered by Geico. Access the full case study to learn more.
Posted: 06 Aug 2022 | Published: 06 Aug 2022

TOPICS:  .NET

Customers’ Data Stolen In Metromile Car Insurance Hack
CASE STUDY: According to a report, Metromile became the victim of a cyber-attack that resulted in many of their customers’ data being stolen by hackers. In this case study, Eclypses discusses how their MTE Technology offering could have played a crucial role in preventing the data breach suffered by Metromile. Read on to learn more.
Posted: 06 Aug 2022 | Published: 06 Aug 2022

TOPICS:  .NET

Samsung Breach: Hacker Group, Lapsus$ Steals Source Code
CASE STUDY: When the cybercriminal syndicate known as Lapsus$ stole source code, Samsung was not prepared to deal with the fallout of the data breach. In this case study, Eclypses argues for how their MTE Technology offering could have aided Samsung through the difficult episode. Access the full case study to learn more about Eclypses MTE Technology.
Posted: 05 Aug 2022 | Published: 05 Aug 2022

TOPICS:  .NET

Hacker Stole $625M From Ronin Bridge, The Blockchain Behind NFT Game Axie Infinity
CASE STUDY: When $625 million worth of cryptocurrency was stolen from Ronin, the blockchain behind the popular crypto game Axie Infinity, the industry was shaken to its core. Eclypses MTE Technology could prevent future attacks by using unique endpoint pairings as verification, so that hackers can’t remotely access a user’s wallet. Read on to learn more.
Posted: 03 Aug 2022 | Published: 03 Aug 2022

TOPICS:  .NET