Vivek Ramachandran (@vivekramac) 's Twitter Profile
Vivek Ramachandran

@vivekramac

Founder, SquareX (@getsquarex) | (exited) Founder, PentesterAcademy (@securitytube) - acquired by INE (@ine) | Defcon - Blackhat Speaker | Book Author

ID: 1243086597026791425

linkhttps://www.sqrx.com calendar_today26-03-2020 08:05:25

5,5K Tweet

25,25K Followers

4,4K Following

SquareX (@getsquarex) 's Twitter Profile Photo

Jeff Moss (Jeff Moss), founder of DEF CON and Black Hat, joins Vivek Ramachandran (Vivek Ramachandran) on this episode of the Be Fearless Podcast for a wide-ranging conversation on the state of cybersecurity—and where it’s headed next. From DEF CON’s new one-roof strategy to the

Jeff Moss (<a href="/thedarktangent/">Jeff Moss</a>), founder of DEF CON and Black Hat, joins Vivek Ramachandran (<a href="/vivekramac/">Vivek Ramachandran</a>) on this episode of the Be Fearless Podcast for a wide-ranging conversation on the state of cybersecurity—and where it’s headed next.

From DEF CON’s new one-roof strategy to the
SquareX (@getsquarex) 's Twitter Profile Photo

Over the last two decades, the way we work has completely changed. Today, 80% of enterprise data is stored in the cloud, and enterprise workflows increasingly rely on SaaS applications accessed entirely through the browser. Thanks to advancements like WebAssembly and

SquareX (@getsquarex) 's Twitter Profile Photo

At BSidesSF, Vivek Ramachandran (Vivek Ramachandran) and Audrey Adeline revealed just how outdated enterprise DLP has become—many solutions still rely on basic regex and can’t even detect something as common as Base64 encoding. Their talk on Data Splicing Attacks showcased how trivial

SquareX (@getsquarex) 's Twitter Profile Photo

Most DLP solutions were never designed with the browser in mind—and it shows. Vivek Ramachandran (Vivek Ramachandran) and Audrey Adeline explored how modern browsers introduce challenges legacy tools can’t handle: SaaS data integrations, personal vs. work contexts, binary channels, and

SquareX (@getsquarex) 's Twitter Profile Photo

📸 Our founder Vivek Ramachandran (Vivek Ramachandran) and Chief of Staff Mridula Kapur at the Gartner Leadership Summit today! Gained a lot of fresh insights and had some fantastic conversations, it's always energizing to connect with others shaping the future of enterprise security.

📸 Our founder Vivek Ramachandran (<a href="/vivekramac/">Vivek Ramachandran</a>) and Chief of Staff Mridula Kapur at the Gartner Leadership Summit today! 

Gained a lot of fresh insights and had some fantastic conversations, it's always energizing to connect with others shaping the future of enterprise security.
Vivek Ramachandran (@vivekramac) 's Twitter Profile Photo

The Coinbase attack is a classic Insider Threat - - Call center employees exfiltrated data from customer support portal - These could be outsourced call centers running unmanaged devices making it difficult to monitor - the customer support apps were web apps so accessed via

SquareX (@getsquarex) 's Twitter Profile Photo

Browsers have become the new endpoint—but most security strategies haven’t caught up. In SC Media’s “2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats” segment, our founder Vivek Ramachandran (Vivek Ramachandran) highlighted why traditional tools leave a

Browsers have become the new endpoint—but most security strategies haven’t caught up. In <a href="/SCMagazine/">SC Media</a>’s “2025 Security Trends: Identity, Endpoint, Cloud &amp; the Rise of Browser Threats” segment, our founder Vivek Ramachandran (<a href="/vivekramac/">Vivek Ramachandran</a>) highlighted why traditional tools leave a
Abhijith B R (@abhijithbr) 's Twitter Profile Photo

Pictures from the panel discussion, 'Building Cyber Defenses to Withstand Adversaries' at RSAConference 2025. Ken Kato, Vivek Ramachandran, and Jonathan Baker. Watch video and deck from the RSAC website: lnkd.in/gNwC3abS #RSAC2025 #ManyVoicesOneCommunity Adversary Village

Pictures from the panel discussion,  'Building Cyber Defenses to Withstand Adversaries' at <a href="/RSAConference/">RSAConference</a> 2025. 
<a href="/CyberCalyx/">Ken Kato</a>, <a href="/vivekramac/">Vivek Ramachandran</a>, and <a href="/JonathanOBaker/">Jonathan Baker</a>.
Watch video and deck from the RSAC website: lnkd.in/gNwC3abS
#RSAC2025 #ManyVoicesOneCommunity <a href="/AdversaryVillag/">Adversary Village</a>
SquareX (@getsquarex) 's Twitter Profile Photo

Catch our founder, Vivek Ramachandran (Vivek Ramachandran), at the SANS Ransomware Summit 2025 (SANS Institute) this Friday, 30 May at 10:00AM EST. In his talk, "Browser-Native Ransomware in a Cloud-First World," Vivek will break down a new and evolving class of ransomware that

Catch our founder, Vivek Ramachandran (<a href="/vivekramac/">Vivek Ramachandran</a>), at the SANS Ransomware Summit 2025 (<a href="/SANSInstitute/">SANS Institute</a>) this Friday, 30 May at 10:00AM EST.

In his talk, "Browser-Native Ransomware in a Cloud-First World," Vivek will break down a new and evolving class of ransomware that
SquareX (@getsquarex) 's Twitter Profile Photo

Join our founder, Vivek Ramachandran (Vivek Ramachandran), at the SANS Ransomware Summit 2025 (SANS Institute) this Friday, May 30 at 10:00 AM EST. In his session, “Browser-Native Ransomware in a Cloud-First World,” Vivek will unpack a new class of ransomware that runs fully in the

Join our founder, Vivek Ramachandran (<a href="/vivekramac/">Vivek Ramachandran</a>), at the SANS Ransomware Summit 2025 (<a href="/SANSInstitute/">SANS Institute</a>) this Friday, May 30 at 10:00 AM EST.

In his session, “Browser-Native Ransomware in a Cloud-First World,” Vivek will unpack a new class of ransomware that runs fully in the
Vivek Ramachandran (@vivekramac) 's Twitter Profile Photo

Big one! SquareX's research team has uncovered a new attack which can abuse the FullScreen API on Safari to "turbocharge" Browser-in-the-Middle attacks bleepingcomputer.com/news/security/… IMHO if you don't have any defenses in your browsers, you are wide open to browser-native attacks like

SquareX (@getsquarex) 's Twitter Profile Photo

Happening soon! Our founder Vivek Ramachandran takes the stage at the SANS Ransomware Summit 2025 at 12:45 PM EST to present "Browser-Native Ransomware in a Cloud-First World" - a deep dive into a new class of ransomware that operates entirely within the browser, completely sidestepping

Happening soon! Our founder <a href="/vivekramac/">Vivek Ramachandran</a> takes the stage at the SANS Ransomware Summit 2025 at 12:45 PM EST to present "Browser-Native Ransomware in a Cloud-First World" - a deep dive into a new class of ransomware that operates entirely within the browser, completely sidestepping
SquareX (@getsquarex) 's Twitter Profile Photo

We’re live now at the SANS Institute Ransomware Summit 2025, where founder Vivek Ramachandran is presenting “Browser-Native Ransomware in a Cloud-First World” — revealing how attackers are bypassing EDRs entirely by targeting victim identities directly in the browser. The talk covers

We’re live now at the <a href="/SANSInstitute/">SANS Institute</a> Ransomware Summit 2025, where founder <a href="/vivekramac/">Vivek Ramachandran</a> is presenting “Browser-Native Ransomware in a Cloud-First World” — revealing how attackers are bypassing EDRs entirely by targeting victim identities directly in the browser.

The talk covers
SquareX (@getsquarex) 's Twitter Profile Photo

“This browser is now a managed browser, but controlled by the attacker.” Live from the SANS Institute Ransomware Summit 2025: our founder Vivek Ramachandran is now explaining Browser-Native Ransomware via Browser Syncjacking — how a single malicious extension can sync an attacker's

“This browser is now a managed browser, but controlled by the attacker.”

Live from the <a href="/SANSInstitute/">SANS Institute</a> Ransomware Summit 2025: our founder <a href="/vivekramac/">Vivek Ramachandran</a> is now explaining Browser-Native Ransomware via Browser Syncjacking — how a single malicious extension can sync an attacker's
SquareX (@getsquarex) 's Twitter Profile Photo

“Everyone has heterogenous browsers, making it difficult to monitor and figure out what’s happening — and that’s what attackers are taking advantage of.” With the browser being the new endpoint, enterprises need to invest in Browser Detection and Response (BDR) solutions more

“Everyone has heterogenous browsers, making it difficult to monitor and figure out what’s happening — and that’s what attackers are taking advantage of.”

With the browser being the new endpoint, enterprises need to invest in Browser Detection and Response (BDR) solutions more
DomainTools (@domaintools) 's Twitter Profile Photo

🎧 New #BreakingBadness episode! How are domains powering modern cyber attacks—from AI phishing kits to nation-state ops? Host Kali Fencl + top experts break it down: Joe Słowik 🌻 | Robert Duncan | John Fokker | Vivek Ramachandran 🎙️ Listen now: podcasts.apple.com/us/podcast/bey…

🎧 New #BreakingBadness episode!
How are domains powering modern cyber attacks—from AI phishing kits to nation-state ops?

Host <a href="/KaliFencl/">Kali Fencl</a> + top experts break it down:
<a href="/jfslowik/">Joe Słowik 🌻</a> | Robert Duncan | John Fokker | <a href="/vivekramac/">Vivek Ramachandran</a>

🎙️ Listen now: podcasts.apple.com/us/podcast/bey…
SquareX (@getsquarex) 's Twitter Profile Photo

The next episode of the Be Fearless podcast featuring HD Moore is out! If you’re in the cybersecurity field, HD Moore, runZero (runZero, Inc.) founder and creator of Metasploit, needs no introduction — his work has fundamentally changed how the security industry thinks about

The next episode of the Be Fearless podcast featuring HD Moore is out! 

If you’re in the cybersecurity field, HD Moore, runZero (<a href="/runZeroInc/">runZero, Inc.</a>) founder and creator of Metasploit, needs no introduction — his work has fundamentally changed how the security industry thinks about
SquareX (@getsquarex) 's Twitter Profile Photo

Attackers have a new favorite entry point: the browser. As enterprises go cloud-first and employees spend most of their time in the browser, the old playbook no longer works. Endpoint agents can't detect threats if there’s no download, while network-layer tools can't see what