Products
PRODUCTs
Oligo Focus
Oligo ADR
Solutions
Why Oligo
Real-Time Scanning and Monitoring
Real-Time BOM/VEX
Supply Chain Security
Application Vulnerability Management
Attack Detection and Response
Compliance and Assurance
Resources
Resources
Resource Center
Blog
Events
Webinars
appsec academy
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
ByBit $1.5B Crypto Heist: ADR Best Practices and Lessons Learned
Read More
Customers
customers
All stories
Mural
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Company
company
About Oligo
Newsroom
Partners
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
menu
Products
Resources
Customers
Company
Back
PRODUCTS
Oligo Focus
Oligo ADR
Solutions
Why Oligo
Real-Time Scanning
and Monitoring
Real-Time BOM/VEX
Supply Chain Security
Application Vulnerability
Management
Attack Detection and Response
Compliance and Assurance
Back
Resources
Resource Center
Blog
Events
Webinars
appsec academy
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
ByBit $1.5B Crypto Heist: ADR Best Practices and Lessons Learned
Read More
Back
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Back
company
About Oligo
Newsroom
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
Book a Demo
Guy Kaplan
More Articles by
Guy Kaplan
Security
Recent CrowdStrike Outage Emphasizes the Need for eBPF-Based Sensors
Read more
Research
Shadow Vulnerability
Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough
Read more
Security
Critical RCE Vulnerabilities in OpenSSH (CVE-2024-6387, CVE-2024-6409) - How to Detect and Mitigate
Read more
Product
XZ-actly What You Need (CVE-2024-3094): Detecting Exploitation with Oligo
Read more
Research
Shadow Vulnerability
ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild
Read more
Security
On Loaded vs. Executed Libraries During Runtime – What This Means for Reachability
Read more
Research
Shadow Vulnerability
ShellTorch: Multiple Critical Vulnerabilities in PyTorch TorchServe Threatens Countless AI Users
Read more
No items found.
No items found.