Platform
SOLUTIONS
Runtime Vulnerability Management
Cloud Application Detection & Response
Runtime AI Security
Use Cases
Why Oligo
Application Vulnerability Management
Attack Detection and Response
Workload Protection
AI - SPM
Supply Chain Security
Real-Time BOM/VEX
Compliance and Assurance
Resources
Resources
Resource Center
Blog
Events
Webinars
RUNTIME ACADEMY
Cloud Security
Application Security
AI Security
Open Source Security
featured Blog
Oligo Runtime AI Security
Oligo Launches Runtime AI Security: Real-Time Protection for the AI Era
Read More
Customers
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Company
company
About Oligo
Newsroom
Partners
Contact us
Careers
featured news
AI Hacks AI: Cybercriminals Unleash An AI-Powered, Self-Replicating Botnet
Read More
menu
Solutions
Resources
Customers
Company
Back
Platform
Runtime Vulnerability
Management
Cloud Application
Detection & Response
Runtime AI Security
Use Cases
Why Oligo
Application Vulnerability
Management
Attack Detection and Response
Workload Protection
AI - SPM
Supply Chain Security
Real-Time BOM/VEX
Compliance and Assurance
Back
Resources
Resource Center
Blog
Events
Webinars
RUNTIME ACADEMY
Cloud Security
Application Security
AI Security
Open Source Security
featured Blog
Oligo Runtime AI Security
Oligo Launches Runtime AI Security: Real-Time Protection for the AI Era
Read More
Back
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Back
company
About Oligo
Newsroom
Contact us
Careers
featured news
Fluent Bit vulnerabilities could enable full cloud takeover
Read More
Book a Demo

Guy Kaplan

More Articles by
Guy Kaplan

Security

Recent CrowdStrike Outage Emphasizes the Need for eBPF-Based Sensors

Read more
Research
Shadow Vulnerability

Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough

Read more
Security

Critical RCE Vulnerabilities in OpenSSH (CVE-2024-6387, CVE-2024-6409) - How to Detect and Mitigate

Read more
Product

XZ-actly What You Need (CVE-2024-3094): Detecting Exploitation with Oligo

Read more
Research
Shadow Vulnerability

ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild

Read more
Security

On Loaded vs. Executed Libraries During Runtime – What This Means for Reachability

Read more
Research
AI

ShellTorch: Multiple Critical Vulnerabilities in PyTorch TorchServe Threatens Countless AI Users

Read more
No items found.
No items found.
COMPANY
HomeAboutContactCustomersCareersPartners
SOLUTIONS
Runtime Vulnerability ManagementCloud Application Detection & Response
Use Cases
Application Vulnerability ManagementAttack Detection and ResponseWorkload ProtectionAI SecuritySupply Chain SecurityReal-Time BOM/VEXCompliance and Assurance
RESOURCES
Resource CenterBlogNewsEventsAcademyWhitepapersApplication Detection & ResponseReachability Analysis
Copyright © Oligo Security| All Rights Reserved 2025
Terms of usePrivacy PolicyCookie Policy
AICPA SOCISO