menu
Product
PRODUCT
Oligo Focus
Fix only what matters
Oligo ADR
Stop attacks before they impact your business
Solutions
Solutions
Vulnerability Scanning
Real-Time BOM /VEX
Supply Chain Security
Application Security Posture
Detection & IR
Compliance
Resources
Resources
Resource Center
Blog
News
Events
Webinars & Videos
Whitepapers
Company
Company
About us
Why Oligo
Careers
Customers
menu
Product
PRODUCT
Oligo Focus
Fix only what matters
Oligo ADR
Stop attach before they impact your business
Solutions
Solutions
Vulnerability Scanning
Fix only what matters
Real-Time BOM /VEX
Stop attach before they impact your business
Supply Chain Security
Stop attach before they impact your business
Application Security Posture
Stop attach before they impact your business
Detection & IR
Stop attach before they impact your business
Compliance
Stop attach before they impact your business
Resources
Resources
Resource Center
Engaging discussions on the latest runtime security
Blog
Deep dives into recent trends, updates and insights
News
Latest announcements & security updates
Events
Join us at upcoming security events and workshops
Webinars & Videos
See how businesses enhance their security posture
Whitepapers
See how businesses enhance their security posture
Company
Company
About us
Fix only what matters
Why Oligo
Stop attach before they impact your business
Careers
Stop attach before they impact your business
Customers
Contact
Book a Demo
BLOG
Research
More Models, More ProbLLMs
Avi Lumelsky
,
,
October 30, 2024
Categories
All
General
Product
Research
Security
Shadow Vulnerability
All
Product
ADR vs. RASP: It’s All About the TCO
Jeanette Sherman
,
,
November 20, 2024
All
Research
New Remote Code Execution (RCE) Vulnerabilities in CUPS for Linux: Threats and Mitigations
Avi Lumelsky
,
Uri Katz
,
September 28, 2024
All
Product
Oligo Platform News: Operationalization & Workflows Updates
Jeanette Sherman
,
,
September 26, 2024
All
Product
The No-Blind-Spot Software Supply Chain: How Oligo Sees It All
Jeanette Sherman
,
,
September 23, 2024
All
Research
Shadow Vulnerability
Shining a Light on Shadow Vulnerabilities
Avi Lumelsky
,
Gal Elbaz
,
September 19, 2024
All
General
Oligo Wins SC Award for Best Supply Chain Security Solution
Nadav Czerninski
,
,
September 17, 2024
All
General
Oligo Named Finalist by SC Awards for Best Supply Chain Solution of 2024
Nadav Czerninski
,
,
September 3, 2024
All
Research
Shadow Vulnerability
TensorFlow Keras Downgrade Attack: CVE-2024-3660 Bypass
Avi Lumelsky
,
,
August 20, 2024
All
Research
Shadow Vulnerability
0.0.0.0 Day: Exploiting Localhost APIs From the Browser
Avi Lumelsky
,
,
August 7, 2024
All
Security
Recent CrowdStrike Outage Emphasizes the Need for eBPF-Based Sensors
Guy Kaplan
,
,
July 19, 2024
All
Product
Now Showing in the Oligo Application Defense Platform: Direct and Transitive Dependencies
Jeanette Sherman
,
,
July 15, 2024
All
Research
Shadow Vulnerability
Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough
Uri Katz
,
Guy Kaplan
,
Avi Lumelsky
July 8, 2024
All
Security
App-Level eBPF Applications - User vs. Kernel Probes
Avi Lumelsky
,
,
July 1, 2024
All
Security
Critical RCE Vulnerabilities in OpenSSH (CVE-2024-6387, CVE-2024-6409) - How to Detect and Mitigate
Guy Kaplan
,
,
July 1, 2024
All
Security
Practical AppSec, Part II: The Limitations of “Shift Left” (and Why Runtime Is the Right Time)
Jeanette Sherman
,
,
June 24, 2024
All
Product
What is Application Detection & Response (ADR)?
Gal Elbaz
,
,
June 18, 2024
All
Product
Shadow Vulnerability
Oligo ADR in action: PaddlePaddle Shadow Vulnerability
Nitzan Mousseri
,
,
June 9, 2024
All
General
Oligo Security Named to Rising in Cyber 2024
Nadav Czerninski
,
,
June 4, 2024
All
Product
Shadow Vulnerability
Oligo ADR in Action: LLM Prompt Injection
Nitzan Mousseri
,
,
May 20, 2024
All
Security
Deep Dive on the XZ Backdoor: CVE 2024-3094 Enables Remote Code Execution in XZ (5.6.0-5.6.1)
Jeanette Sherman
,
,
May 1, 2024
All
Product
XZ-actly What You Need (CVE-2024-3094): Detecting Exploitation with Oligo
Guy Kaplan
,
Uri Katz
,
Nitzan Mousseri
April 2, 2024
All
Research
Shadow Vulnerability
ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild
Avi Lumelsky
,
Guy Kaplan
,
Gal Elbaz
March 26, 2024
All
Security
The Definitive Guide to Runtime Vulnerability Prioritization
Harel Hilu
,
,
March 7, 2024
All
Security
On Loaded vs. Executed Libraries During Runtime – What This Means for Reachability
Guy Kaplan
,
,
February 28, 2024
All
Security
Practical AppSec, Part I: Why Devs Don’t Trust AppSec Findings (And What You Can Do About It)
Jeanette Sherman
,
,
February 12, 2024
All
Product
Oligo’s Best Features of 2023 (And an Exciting Sneak Peek at 2024)
Avshalom Hilu
,
,
January 30, 2024
All
Security
AppSec in the Age of AI: Predicting Challenges and Opportunities
Nadav Czerninski
,
,
December 19, 2023
All
Research
Shadow Vulnerability
ShellTorch: Multiple Critical Vulnerabilities in PyTorch TorchServe Threatens Countless AI Users
Idan Levcovich
,
Guy Kaplan
,
Gal Elbaz
October 3, 2023
All
Security
Oligo and WebP 0-Day: Keep Calm and Check the Runtime Context
Gal Elbaz
,
,
September 28, 2023
All
Security
4 Tips for Adopting a Practical Approach to AppSec
Robert Kugler
,
,
September 18, 2023
All
Product
Scaling Runtime Security: How eBPF is Solving Decade-Long Challenges
Noam Issachar
,
,
May 7, 2023
All
General
Revolutionizing the Game of Application Security
Avshalom Hilu
,
,
February 15, 2023
All
General
Introducing Oligo: Leading Application Security to Runtime
Nadav Czerninski
,
Gal Elbaz
,
Avshalom Hilu
February 14, 2023