📣 Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
Products
PRODUCTs
Oligo Focus
Oligo ADR
Solutions
Why Oligo
Real-Time Scanning and Monitoring
Real-Time BOM/VEX
Supply Chain Security
Application Vulnerability Management
Attack Detection and Response
Compliance and Assurance
Resources
Resources
Resource Center
Blog
Events
Webinars
appsec academy
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
Critical Vulnerabilities in AirPlay Protocol Affecting Multiple Apple Devices
Read More
Customers
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
OneTrust Uses Oligo to Build Customer Confidence & Save Developers Time
Read More
Company
company
About Oligo
Newsroom
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
menu
Products
Resources
Customers
Company
Back
PRODUCTS
Oligo Focus
Oligo ADR
Solutions
Why Oligo
Real-Time Scanning
and Monitoring
Real-Time BOM/VEX
Supply Chain Security
Application Vulnerability
Management
Attack Detection and Response
Compliance and Assurance
Back
Resources
Resource Center
Blog
Events
Webinars
appsec academy
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
Critical Vulnerabilities in AirPlay Protocol Affecting Multiple Apple Devices
Read More
Back
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
OneTrust Uses Oligo to Build Customer Confidence & Save Developers Time
Read More
Back
company
About Oligo
Newsroom
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
Book a Demo
Avi Lumelsky
More Articles by
Avi Lumelsky
Research
Security
Critical Vulnerabilities in AirPlay Protocol Affecting Multiple Apple Devices
Read more
Research
Shadow Vulnerability
CVE-2024-50050: Critical Vulnerability in meta-llama/llama-stack
Read more
Research
More Models, More ProbLLMs
Read more
Research
New Remote Code Execution (RCE) Vulnerabilities in CUPS for Linux: Threats and Mitigations
Read more
Research
Shadow Vulnerability
Shining a Light on Shadow Vulnerabilities
Read more
Research
Shadow Vulnerability
TensorFlow Keras Downgrade Attack: CVE-2024-3660 Bypass
Read more
Research
Shadow Vulnerability
0.0.0.0 Day: Exploiting Localhost APIs From the Browser
Read more
Research
Shadow Vulnerability
Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough
Read more
Security
App-Level eBPF Applications - User vs. Kernel Probes
Read more
Research
Shadow Vulnerability
ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild
Read more
all
Open Source Security
open-source-security
5 SBOM Generation Tools & 5 Critical Best Practices
Read more
all
Application Security Vulnerabilities
application-security-vulnerabilities
Breaking Down OWASP Top 10 for Web Apps, Mobile, API, K8s and LLMs
Read more
all
Application Security Vulnerabilities
application-security-vulnerabilities
OWASP Top 10 LLM, Updated 2025: Examples and Mitigation Strategies
Read more
all
Application Security
application-security
Runtime Security: Key Components, Technologies and Best Practices
Read more
No items found.