Platform
SOLUTIONS
Runtime Vulnerability Management
Cloud Application Detection & Response
Use Cases
Why Oligo
Application Vulnerability Management
Attack Detection and Response
Workload Protection
AI Security
Supply Chain Security
Real-Time BOM/VEX
Compliance and Assurance
Resources
Resources
Resource Center
Blog
Events
Webinars
RUNTIME ACADEMY
Cloud Security
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
Pwn My Ride: Exploring the CarPlay Attack Surface
Read More
Customers
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Company
company
About Oligo
Newsroom
Partners
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
menu
Solutions
Resources
Customers
Company
Back
Platform
Runtime Vulnerability
Management
Cloud Application
Detection & Response
Use Cases
Why Oligo
Application Vulnerability
Management
Attack Detection and Response
Workload Protection
AI Security
Supply Chain Security
Real-Time BOM/VEX
Compliance and Assurance
Back
Resources
Resource Center
Blog
Events
Webinars
RUNTIME ACADEMY
Cloud Security
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
Pwn My Ride: Exploring the CarPlay Attack Surface
Read More
Back
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Back
company
About Oligo
Newsroom
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
Book a Demo
BLOG
Pwn My Ride: Exploring the CarPlay Attack Surface
Uri Katz
,
Avi Lumelsky
,
Gal Elbaz
September 9, 2025
Categories
All
Engineering
General
Product
Research
Security
Shadow Vulnerability
All
Product
Tackling the Top CWEs from CISA’s KEV List with Oligo
Noah Simon
,
,
September 22, 2025
All
Product
Security
The Hidden Risks of the NPM Supply Chain Attacks: AI Agents
Avi Lumelsky
,
,
September 16, 2025
All
Security
Product
The SOC Visibility Quad: Why Application Visibility Completes the SOC in 2025
Justin McCann
,
Noah Simon
,
August 27, 2025
All
Product
Malicious Packages Don’t Stop at CI: How Oligo CADR Brings Supply-Chain Detection to Runtime
Omer Finger
,
Eliya Cohen
,
August 7, 2025
All
General
Bridging the Runtime Gap: Insights from Frost & Sullivan’s 2025 Cloud / Application Runtime Security Report
Noah Simon
,
,
July 21, 2025
All
Product
Instant Cloud-to-Code Risk Remediation with Oligo MCP
Avi Lumelsky
,
,
July 14, 2025
All
Product
Security
Endor Labs & Oligo: Closing the Loop Between Secure Code and Secure Runtime
Mic McCully
,
Tom Gleason
,
July 10, 2025
All
Research
Security
The Application Attack Matrix: Mapping the Modern Cloud Application Threat Landscape
Avi Lumelsky
,
Hadas Marzook
,
Gal Elbaz
July 9, 2025
All
Security
Product
New Sudo Vulnerabilities: CVE-2025-32462 and CVE-2025-32463
Hadas Marzook
,
Omer Finger
,
July 7, 2025
All
Research
Security
Critical RCE Vulnerability in Anthropic MCP Inspector - CVE-2025-49596
Avi Lumelsky
,
,
June 27, 2025
All
General
Product
Securing the Future of AI: Oligo Named an AI Security Innovator in Latio’s 2025 Market Report
,
,
June 13, 2025
All
Product
Engineering
Not All eBPF Sensors Are Created Equal: Why Depth Matters in Runtime Security
Gal Elbaz
,
Hadas Marzook
,
Omer Finger
June 10, 2025
All
Security
Shadow Vulnerability
Safe By Default or Vulnerable By Design? Golang Server Side Template Injection
Hadas Marzook
,
,
May 22, 2025
All
Security
What I Learned Switching from Traditional AppSec to Prioritized Fixing
J Fridley
,
,
May 19, 2025
All
Product
Beyond Workload Detection: How Oligo Delivers Full-Stack Runtime Security
Noah Simon
,
,
May 6, 2025
All
Research
Airborne: Wormable Zero-Click Remote Code Execution (RCE) in AirPlay Protocol Puts Apple & IoT Devices at Risk
Uri Katz
,
Avi Lumelsky
,
Gal Elbaz
April 29, 2025
All
Security
The Rise of Vulnerability Exploitation as an Initial Attack Vector
Justin McCann
,
Noah Simon
,
April 23, 2025
All
Security
CVE Funding Almost Expired: What You Need to Know
Avi Lumelsky
,
,
April 16, 2025
All
Security
Vibe Coding: Shipping Features or Shipping Vulnerabilities?
Britt Frenkel
,
,
March 28, 2025
All
Product
What is Application Detection and Response (ADR)? 2025 Guide
Gal Elbaz
,
,
March 26, 2025
All
Product
Uncovering the Hidden Risks: How Oligo Identifies 1100% More Vulnerable Functions
Noah Simon
,
Avi Lumelsky
,
March 19, 2025
All
Security
ByBit $1.5B Crypto Heist: ADR Best Practices and Lessons Learned
Justin McCann
,
Noah Simon
,
March 17, 2025
All
Engineering
Observability Revolutions in Oligo's Runtime Sensor
Nathan Quibech
,
,
March 11, 2025
All
Research
Shadow Vulnerability
Shadow Vulnerabilities in AI: The Hidden Perils Beyond CVEs
Avi Lumelsky
,
,
March 3, 2025
All
Security
Product
ADR vs. CDR: Why Application Detection and Response is the Key to Stopping Modern Attacks
Noah Simon
,
,
February 25, 2025
All
Research
Security
Critical Vulnerabilities in AirPlay Protocol Affecting Multiple Apple Devices
Uri Katz
,
Avi Lumelsky
,
Gal Elbaz
January 28, 2025
All
Research
Shadow Vulnerability
CVE-2024-50050: Critical Vulnerability in meta-llama/llama-stack
Avi Lumelsky
,
,
January 23, 2025
All
Product
ADR vs. RASP: It’s All About the TCO
Jeanette Sherman
,
,
November 20, 2024
All
Research
More Models, More ProbLLMs
Avi Lumelsky
,
,
October 30, 2024
All
Research
New Remote Code Execution (RCE) Vulnerabilities in CUPS for Linux: Threats and Mitigations
Avi Lumelsky
,
Uri Katz
,
September 28, 2024
All
Product
Oligo Platform News: Operationalization & Workflows Updates
Jeanette Sherman
,
,
September 26, 2024
All
Product
The No-Blind-Spot Software Supply Chain: How Oligo Sees It All
Jeanette Sherman
,
,
September 23, 2024
All
Research
Shadow Vulnerability
Shining a Light on Shadow Vulnerabilities
Avi Lumelsky
,
Gal Elbaz
,
September 19, 2024
All
General
Oligo Wins SC Award for Best Supply Chain Security Solution
Nadav Czerninski
,
,
September 17, 2024
All
General
Oligo Named Finalist by SC Awards for Best Supply Chain Solution of 2024
Nadav Czerninski
,
,
September 3, 2024
All
Research
Shadow Vulnerability
TensorFlow Keras Downgrade Attack: CVE-2024-3660 Bypass
Avi Lumelsky
,
,
August 20, 2024
All
Research
Shadow Vulnerability
0.0.0.0 Day: Exploiting Localhost APIs From the Browser
Avi Lumelsky
,
,
August 7, 2024
All
Security
Recent CrowdStrike Outage Emphasizes the Need for eBPF-Based Sensors
Guy Kaplan
,
,
July 19, 2024
All
Product
Now Showing in the Oligo Application Defense Platform: Direct and Transitive Dependencies
Jeanette Sherman
,
,
July 15, 2024
All
Research
Shadow Vulnerability
Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough
Uri Katz
,
Guy Kaplan
,
Avi Lumelsky
July 8, 2024
All
Security
Critical RCE Vulnerabilities in OpenSSH (CVE-2024-6387, CVE-2024-6409) - How to Detect and Mitigate
Guy Kaplan
,
,
July 1, 2024
All
Security
App-Level eBPF Applications - User vs. Kernel Probes
Avi Lumelsky
,
,
July 1, 2024
All
Security
Practical AppSec, Part II: The Limitations of “Shift Left” (and Why Runtime Is the Right Time)
Jeanette Sherman
,
,
June 24, 2024
All
Product
Shadow Vulnerability
Oligo ADR in action: PaddlePaddle Shadow Vulnerability
Nitzan Mousseri
,
,
June 9, 2024
All
General
Oligo Security Named to Rising in Cyber 2024
Nadav Czerninski
,
,
June 4, 2024
All
Product
Shadow Vulnerability
Oligo ADR in Action: LLM Prompt Injection
Nitzan Mousseri
,
,
May 20, 2024
All
Security
Deep Dive on the XZ Backdoor: CVE 2024-3094 Enables Remote Code Execution in XZ (5.6.0-5.6.1)
Jeanette Sherman
,
,
May 1, 2024
All
Product
XZ-actly What You Need (CVE-2024-3094): Detecting Exploitation with Oligo
Guy Kaplan
,
Uri Katz
,
Nitzan Mousseri
April 2, 2024
All
Research
Shadow Vulnerability
ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild
Avi Lumelsky
,
Guy Kaplan
,
Gal Elbaz
March 26, 2024
All
Security
The Definitive Guide to Runtime Vulnerability Prioritization
Harel Hilu
,
,
March 7, 2024
All
Security
On Loaded vs. Executed Libraries During Runtime – What This Means for Reachability
Guy Kaplan
,
,
February 28, 2024
All
Security
Practical AppSec, Part I: Why Devs Don’t Trust AppSec Findings (And What You Can Do About It)
Jeanette Sherman
,
,
February 12, 2024
All
Product
Oligo’s Best Features of 2023 (And an Exciting Sneak Peek at 2024)
Avshalom Hilu
,
,
January 30, 2024
All
Security
AppSec in the Age of AI: Predicting Challenges and Opportunities
Nadav Czerninski
,
,
December 19, 2023
All
Research
Shadow Vulnerability
ShellTorch: Multiple Critical Vulnerabilities in PyTorch TorchServe Threatens Countless AI Users
Idan Levcovich
,
Guy Kaplan
,
Gal Elbaz
October 3, 2023
All
Security
Oligo and WebP 0-Day: Keep Calm and Check the Runtime Context
Gal Elbaz
,
,
September 28, 2023
All
Security
4 Tips for Adopting a Practical Approach to AppSec
Robert Kugler
,
,
September 18, 2023
All
Product
Scaling Runtime Security: How eBPF is Solving Decade-Long Challenges
Noam Issachar
,
,
May 7, 2023
All
General
Revolutionizing the Game of Application Security
Avshalom Hilu
,
,
February 15, 2023
All
General
Introducing Oligo: Leading Application Security to Runtime
Nadav Czerninski
,
Gal Elbaz
,
Avshalom Hilu
February 14, 2023