Platform
SOLUTIONS
Runtime Vulnerability Management
Cloud Application Detection & Response
Use Cases
Why Oligo
Application Vulnerability Management
Attack Detection and Response
Workload Protection
AI Security
Supply Chain Security
Real-Time BOM/VEX
Compliance and Assurance
Resources
Resources
Resource Center
Blog
Events
Webinars
RUNTIME ACADEMY
Cloud Security
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
The Application Attack Matrix: Mapping the Modern Cloud Application Threat Landscape
Read More
Customers
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Company
company
About Oligo
Newsroom
Partners
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
menu
Solutions
Resources
Customers
Company
Back
Platform
Runtime Vulnerability
Management
Cloud Application
Detection & Response
Use Cases
Why Oligo
Application Vulnerability
Management
Attack Detection and Response
Workload Protection
AI Security
Supply Chain Security
Real-Time BOM/VEX
Compliance and Assurance
Back
Resources
Resource Center
Blog
Events
Webinars
RUNTIME ACADEMY
Cloud Security
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
The Application Attack Matrix: Mapping the Modern Cloud Application Threat Landscape
Read More
Back
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Back
company
About Oligo
Newsroom
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
Book a Demo

Gal Elbaz

Gal Elbaz is the Co-Founder and CTO at Oligo Security, bringing over a decade of expertise in vulnerability research and ethical hacking. Gal started his career as a security engineer in the IDF's elite intelligence unit. Later on, he joined Check Point, where he was instrumental in building the research team and served as a senior security researcher. In his free time, Gal enjoys playing the guitar and participating in CTF (Capture The Flag) challenges.

More Articles by
Gal Elbaz

Research
Security

The Application Attack Matrix: Mapping the Modern Cloud Application Threat Landscape

Read more
Product
Engineering

Not All eBPF Sensors Are Created Equal: Why Depth Matters in Runtime Security

Read more
Research

Airborne: Wormable Zero-Click Remote Code Execution (RCE) in AirPlay Protocol Puts Apple & IoT Devices at Risk

Read more
Product

What is Application Detection and Response (ADR)? 2025 Guide

Read more
Research
Security

Critical Vulnerabilities in AirPlay Protocol Affecting Multiple Apple Devices

Read more
Research
Shadow Vulnerability

Shining a Light on Shadow Vulnerabilities

Read more
Research
Shadow Vulnerability

ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild

Read more
Research
Shadow Vulnerability

ShellTorch: Multiple Critical Vulnerabilities in PyTorch TorchServe Threatens Countless AI Users

Read more
Security

Oligo and WebP 0-Day: Keep Calm and Check the Runtime Context

Read more
General

Introducing Oligo: Leading Application Security to Runtime

Read more
all
Application Security
application-security

Static Code Analysis: Top 7 Methods, Pros/Cons and Best Practices

Read more
all
Open Source Security
open-source-security

Open Source Security: Threats, Technologies, and Best Practices

Read more
all
Application Security Vulnerabilities
application-security-vulnerabilities

Code Execution Vulnerability: Impact, Causes, and 8 Defensive Measures

Read more
all
Application Security Vulnerabilities
application-security-vulnerabilities

8 Types of Code Injection and 8 Ways to Prevent Them

Read more
all
Open Source Security
open-source-security

Open Source Dependency Scanners: 4 Key Features and Best Practices

Read more
all
Application Security
application-security

Application Security in 2025: Threats, Solutions and Best Practices

Read more
all
Open Source Security
open-source-security

Software Composition Analysis: Challenges and Best Practices

Read more
all
Application Security Vulnerabilities
application-security-vulnerabilities

OWASP Top 10: Cheat Sheet of Cheat Sheets

Read more
all
Open Source Security
open-source-security

eBPF Security: Top 5 Use Cases, Challenges and Best Practices

Read more
all
Application Security Vulnerabilities
application-security-vulnerabilities

4 Modern Vulnerability Prioritization Methods for 2025

Read more
all
Application Security
application-security

Reachability Analysis: 5 Techniques and 5 Critical Best Practices

Read more
No items found.
COMPANY
HomeAboutContactCustomersCareersPartners
SOLUTIONS
Runtime Vulnerability ManagementCloud Application Detection & Response
Use Cases
Application Vulnerability ManagementAttack Detection and ResponseWorkload ProtectionAI SecuritySupply Chain SecurityReal-Time BOM/VEXCompliance and Assurance
RESOURCES
Resource CenterBlogNewsEventsAcademyWhitepapersApplication Detection & ResponseReachability Analysis
Copyright © Oligo Security| All Rights Reserved 2025
Terms of usePrivacy PolicyCookie Policy
AICPA SOCISO