Published inSquareX Labs6 Reasons Why Enterprises Are Shifting from VDI to SquareXSquareX’s VDI Replacement Solution — Contractor & Developer Access through Secure Private EnvironmentsOct 11Oct 11
Published inSquareX LabsSquareX: The Future of BYOD Security for EnterprisesConvert the Browsers on BYOD / Unmanaged Devices into Secure Browsing SessionsSep 14Sep 14
Published inSquareX LabsThe HTML, CSS and Javascript Trojan Horse — Smuggling Malware through Web Resources‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointSep 11Sep 11
Published inSquareX LabsA Picture is Worth a Thousand Threats: Using Steganography to Deliver Malware Past Secure Web…‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointSep 5Sep 5
Published inSquareX LabsWebAssembly: The Fly on the Wall Delivering Malware Past Secure Web Gateways‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointAug 28Aug 28
Published inSquareX LabsSecure Web Gateway Vulnerabilities Exposed: SquareX’s Research Stirs the IndustryAt DEF CON 32 this year, SquareX presented compelling research that revealed the shortcomings of Secure Web Gateways (SWG) in protecting…Aug 26Aug 26
Published inSquareX LabsIdentity crisis? Manageable. Identity attacks? Crisis!Don’t let your employees fall prey to identity attacksJul 18Jul 18
Published inSquareX Labs“Consider the Macro Perspective” — The Persistence of Macro-based MalwareUse SquareX to put an end to their three-decade streakJul 10Jul 10
Published inSquareX Labs10 Billion passwords leaked: What will hackers discover with yours?Protect your enterprise from credential stuffing attacks with SquareXJul 9Jul 9
Published inSquareX Labs“May I please access your data?” Browser Extension Seeks Risky Permissions!Manage the browser extensions used by your employees by restricting the permissions they can seekJul 7Jul 7