Engineering @ SquareXinSquareX Labs6 Reasons Why Enterprises Are Shifting from VDI to SquareXSquareX’s VDI Replacement Solution — Contractor & Developer Access through Secure Private EnvironmentsOct 11Oct 11
Engineering @ SquareXinSquareX LabsSquareX: The Future of BYOD Security for EnterprisesConvert the Browsers on BYOD / Unmanaged Devices into Secure Browsing SessionsSep 14Sep 14
Engineering @ SquareXinSquareX LabsThe HTML, CSS and Javascript Trojan Horse — Smuggling Malware through Web Resources‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointSep 11Sep 11
Engineering @ SquareXinSquareX LabsA Picture is Worth a Thousand Threats: Using Steganography to Deliver Malware Past Secure Web…‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointSep 5Sep 5
Engineering @ SquareXinSquareX LabsWebAssembly: The Fly on the Wall Delivering Malware Past Secure Web Gateways‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointAug 28Aug 28
Engineering @ SquareXinSquareX LabsSecure Web Gateway Vulnerabilities Exposed: SquareX’s Research Stirs the IndustryAt DEF CON 32 this year, SquareX presented compelling research that revealed the shortcomings of Secure Web Gateways (SWG) in protecting…Aug 26Aug 26
Engineering @ SquareXinSquareX LabsIdentity crisis? Manageable. Identity attacks? Crisis!Don’t let your employees fall prey to identity attacksJul 18Jul 18
Engineering @ SquareXinSquareX Labs“Consider the Macro Perspective” — The Persistence of Macro-based MalwareUse SquareX to put an end to their three-decade streakJul 10Jul 10
Engineering @ SquareXinSquareX Labs10 Billion passwords leaked: What will hackers discover with yours?Protect your enterprise from credential stuffing attacks with SquareXJul 9Jul 9
Engineering @ SquareXinSquareX Labs“May I please access your data?” Browser Extension Seeks Risky Permissions!Manage the browser extensions used by your employees by restricting the permissions they can seekJul 7Jul 7