enterprise security

Level Up Cybersecurity with Kasm Workspaces
Ever look at plethora of browser tabs staring back at you with “I’ll check this out later” vibes and feel the urge to mercy-close the ones that just wont get done anytime ...

The Difference Between Breach Prevention and Breach Readiness and Why It Matters
At ColorTokens our mission is to help our clients win in the ongoing, dynamic battle against hackers and malicious actors that is being fought 24 hours a day, seven days a week. ...

Let’s Encrypt for non-webservers
Let’s say you want to use Let’s Encrypt for something that isn’t a website. So you download certbot, you get things going with your manual cert, and you realize that when it ...

Showcasing our Industry-First BDR Solution in Singapore
SquareX @ Cyber Security World Asia + GovWare 2024October 2024 marked an exciting time for SquareX as we returned to our home ground, Singapore, for two significant back-to-back events: Cyber Security World Asia ...
CISA and FBI Issue Alert on XSS Vulnerabilities
Cross-site scripting (XSS) vulnerabilities continue to be a major concern in today’s software landscape, despite being preventable. CISA and FBI have issued a Secure by Design alert to reduce the prevalence of ...
The Role of Open-Source Software in Enterprise Security
Open-source software fosters collaboration and transparency, leading to quicker vulnerability fixes. Open-source software offers a cost-effective alternative to proprietary solutions, without compromising on security. Live patching in Linux enhances enterprise security by ...
Building a Secure Linux Environment for Enterprise Applications
Enterprises today face sophisticated attacks that are often targeted, persistent, and difficult to detect. Keep your Linux environment secure with automated live patching to apply security updates without downtime. Configure firewalls ...

The HTML, CSS and Javascript Trojan Horse — Smuggling Malware through Web Resources
The HTML, CSS and Javascript Trojan Horse — Smuggling Malware through Web Resources‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointAt DEF CON 32, SquareX ...
Sedexp Malware: The Stealthy Linux Threat Evading Detection
A new, sophisticated Linux malware named “sedexp” has been discovered, quietly evading detection since 2022. Its unique persistence technique, leveraging udev rules, has allowed it to operate under the radar, making it ...

A Picture is Worth a Thousand Threats: Using Steganography to Deliver Malware Past Secure Web…
A Picture is Worth a Thousand Threats: Using Steganography to Deliver Malware Past Secure Web Gateways‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointAt ...