Platform
SOLUTIONS
Runtime Vulnerability Management
Cloud Application Detection & Response
Use Cases
Why Oligo
Application Vulnerability Management
Attack Detection and Response
Workload Protection
AI Security
Supply Chain Security
Real-Time BOM/VEX
Compliance and Assurance
Resources
Resources
Resource Center
Blog
Events
Webinars
appsec academy
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
Airborne: Wormable Zero-Click Remote Code Execution (RCE) in AirPlay Protocol Puts Apple & IoT Devices at Risk
Read More
Customers
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Company
company
About Oligo
Newsroom
Partners
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
menu
Solutions
Resources
Customers
Company
Back
Platform
Runtime Vulnerability
Management
Cloud Application
Detection & Response
Use Cases
Why Oligo
Application Vulnerability
Management
Attack Detection and Response
Workload Protection
AI Security
Supply Chain Security
Real-Time BOM/VEX
Compliance and Assurance
Back
Resources
Resource Center
Blog
Events
Webinars
appsec academy
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
Airborne: Wormable Zero-Click Remote Code Execution (RCE) in AirPlay Protocol Puts Apple & IoT Devices at Risk
Read More
Back
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Back
company
About Oligo
Newsroom
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
Book a Demo
Guy Kaplan
More Articles by
Guy Kaplan
Security
Recent CrowdStrike Outage Emphasizes the Need for eBPF-Based Sensors
Read more
Research
Shadow Vulnerability
Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough
Read more
Security
Critical RCE Vulnerabilities in OpenSSH (CVE-2024-6387, CVE-2024-6409) - How to Detect and Mitigate
Read more
Product
XZ-actly What You Need (CVE-2024-3094): Detecting Exploitation with Oligo
Read more
Research
Shadow Vulnerability
ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild
Read more
Security
On Loaded vs. Executed Libraries During Runtime – What This Means for Reachability
Read more
Research
Shadow Vulnerability
ShellTorch: Multiple Critical Vulnerabilities in PyTorch TorchServe Threatens Countless AI Users
Read more
No items found.
No items found.