Text
Text
Text
Platform
Platform
Overview
Runtime Protection
Runtime Posture
Runtime AI Security
Solutions
Solutions
Who it's for
Security Leaders
SecOps Pros
AppSec Pros
CloudSec Pros
Use cases
Workload protection
Real-time bom/vex
Application vulnerability management
AI security
Compliance and assurance
Attack detection and response
Supply chain security
Customers
Customers
All case studies
Cato Networks
Leading Crypto Exchange
Mural
One Trust
Cresta
Major FinServ Company
Nasdaq Traded Company
Openweb
Learn
Learn
Resource hub
Blog
Runtime academy
Newsroom
Threat research
App attack matrix
Company
Company
About Us
Partners
Careers
Contact Us
Book a demo
Book a demo
→
→
Book a demo
Book a demo
→
→
Search
Product
Noah Simon
Runtime Exploit Blocking: Protection for the AI Era
Read more
Read more
→
→
Categories
All
AI
Engineering
General
Product
Research
Security
Shadow Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Critical Apache Tomcat Flaw Allows Full Server and Application Takeover (CVE-2026-29146)
This is some text inside of a div block.
Uri Katz
Avi Lumelsky
Research
Security
Broken by Default: New Vulnerabilities in IBM WebSphere Liberty Can Lead to Full Server Compromise
This is some text inside of a div block.
Uri Katz
Research
Security
TeamPCP Campaign: The Evolution of Modern Supply Chain Attacks
This is some text inside of a div block.
Avi Lumelsky
Gal Elbaz
Security
Research
Malicious axios Packages Published via Compromised Credentials: What Happened and Recommended Actions
This is some text inside of a div block.
Gal Elbaz
Uri Katz
Security
Research
Vulnerability Management Needs a New Executive Lens at Runtime
This is some text inside of a div block.
Dan Castle
General
Product
Docling RCE: A Shadow Vulnerability Introduced via PyYAML (CVE-2026-24009)
This is some text inside of a div block.
Avi Lumelsky
Research
AI
Show Me the Call Stack: Proving Exploitability with Runtime Evidence
This is some text inside of a div block.
Noah Simon
Product
Reflecting on a Breakthrough Year
This is some text inside of a div block.
Nadav Czerninski
General
Security
Critical React & Next.js RCE Vulnerability (CVE-2025-55182 & CVE-2025-66478): What You Need To Know
This is some text inside of a div block.
Gal Elbaz
Avi Lumelsky
Uri Katz
Security
Research
Critical Vulnerabilities in FluentBit Expose Cloud Environments to Remote Takeover
This is some text inside of a div block.
Uri Katz
Research
Security
ShadowRay 2.0: Attackers Turn AI Against Itself in Global Campaign that Hijacks AI Into Self-Propagating Botnet
This is some text inside of a div block.
Avi Lumelsky
Gal Elbaz
AI
Research
ShadowMQ: How Code Reuse Spread Critical Vulnerabilities Across the AI Ecosystem
This is some text inside of a div block.
Avi Lumelsky
Research
AI
The Future of Cloud Security is Runtime
This is some text inside of a div block.
Noah Simon
Justin McCann
Product
Security
CVE-2025-61882: Oracle E-Business Suite Zero-Day Exploited in Clop Extortion Campaigns
This is some text inside of a div block.
Hadas Marzook
Security
Product
Why EDR Missed the GeoServer Exploit: The Case for Cloud Application Detection & Response (CADR)
This is some text inside of a div block.
Justin McCann
Noah Simon
Product
Security
Tackling the Top CWEs from CISA’s KEV List with Oligo
This is some text inside of a div block.
Noah Simon
Product
The Hidden Risks of the NPM Supply Chain Attacks: AI Agents
This is some text inside of a div block.
Avi Lumelsky
Product
Security
Pwn My Ride: Exploring the CarPlay Attack Surface
This is some text inside of a div block.
Uri Katz
Avi Lumelsky
Gal Elbaz
The SOC Visibility Quad: Why Application Visibility Completes the SOC in 2025
This is some text inside of a div block.
Justin McCann
Noah Simon
Security
Product
Malicious Packages Don’t Stop at CI: How Oligo CADR Brings Supply-Chain Detection to Runtime
This is some text inside of a div block.
Omer Finger
Eliya Cohen
Product
Bridging the Runtime Gap: Insights from Frost & Sullivan’s 2025 Cloud / Application Runtime Security Report
This is some text inside of a div block.
Noah Simon
General
Instant Cloud-to-Code Risk Remediation with Oligo MCP
This is some text inside of a div block.
Avi Lumelsky
Product
Endor Labs & Oligo: Closing the Loop Between Secure Code and Secure Runtime
This is some text inside of a div block.
Mic McCully
Tom Gleason
Product
Security
The Application Attack Matrix: Mapping the Modern Cloud Application Threat Landscape
This is some text inside of a div block.
Avi Lumelsky
Hadas Marzook
Gal Elbaz
Research
Security
New Sudo Vulnerabilities: CVE-2025-32462 and CVE-2025-32463
This is some text inside of a div block.
Hadas Marzook
Omer Finger
Security
Product
Critical RCE Vulnerability in Anthropic MCP Inspector - CVE-2025-49596
This is some text inside of a div block.
Avi Lumelsky
AI
Security
Securing the Future of AI: Oligo Named an AI Security Innovator in Latio’s 2025 Market Report
This is some text inside of a div block.
General
Product
Not All eBPF Sensors Are Created Equal: Why Depth Matters in Runtime Security
This is some text inside of a div block.
Gal Elbaz
Hadas Marzook
Omer Finger
Product
Engineering
Safe By Default or Vulnerable By Design? Golang Server Side Template Injection
This is some text inside of a div block.
Hadas Marzook
Security
Shadow Vulnerability
What I Learned Switching from Traditional AppSec to Prioritized Fixing
This is some text inside of a div block.
J Fridley
Security
Beyond Workload Detection: How Oligo Delivers Full-Stack Runtime Security
This is some text inside of a div block.
Noah Simon
Product
Airborne: Wormable Zero-Click Remote Code Execution (RCE) in AirPlay Protocol Puts Apple & IoT Devices at Risk
This is some text inside of a div block.
Uri Katz
Avi Lumelsky
Gal Elbaz
Research
The Rise of Vulnerability Exploitation as an Initial Attack Vector
This is some text inside of a div block.
Justin McCann
Noah Simon
Security
CVE Funding Almost Expired: What You Need to Know
This is some text inside of a div block.
Avi Lumelsky
Security
Vibe Coding: Shipping Features or Shipping Vulnerabilities?
This is some text inside of a div block.
Britt Frenkel
Security
What is Application Detection and Response (ADR)? 2025 Guide
This is some text inside of a div block.
Gal Elbaz
Product
Uncovering the Hidden Risks: How Oligo Identifies 1100% More Vulnerable Functions
This is some text inside of a div block.
Noah Simon
Avi Lumelsky
Product
ByBit $1.5B Crypto Heist: ADR Best Practices and Lessons Learned
This is some text inside of a div block.
Justin McCann
Noah Simon
Security
Observability Revolutions in Oligo's Runtime Sensor
This is some text inside of a div block.
Nathan Quibech
Engineering
Shadow Vulnerabilities in AI: The Hidden Perils Beyond CVEs
This is some text inside of a div block.
Avi Lumelsky
AI
Research
ADR vs. CDR: Why Application Detection and Response is the Key to Stopping Modern Attacks
This is some text inside of a div block.
Noah Simon
Security
Product
Critical Vulnerabilities in AirPlay Protocol Affecting Multiple Apple Devices
This is some text inside of a div block.
Uri Katz
Avi Lumelsky
Gal Elbaz
Research
Security
CVE-2024-50050: Critical Vulnerability in meta-llama/llama-stack
This is some text inside of a div block.
Avi Lumelsky
AI
Research
ADR vs. RASP: It’s All About the TCO
This is some text inside of a div block.
Jeanette Sherman
Product
More Models, More ProbLLMs
This is some text inside of a div block.
Avi Lumelsky
AI
Research
New Remote Code Execution (RCE) Vulnerabilities in CUPS for Linux: Threats and Mitigations
This is some text inside of a div block.
Avi Lumelsky
Uri Katz
Research
Oligo Platform News: Operationalization & Workflows Updates
This is some text inside of a div block.
Jeanette Sherman
Product
The No-Blind-Spot Software Supply Chain: How Oligo Sees It All
This is some text inside of a div block.
Jeanette Sherman
Product
Shining a Light on Shadow Vulnerabilities
This is some text inside of a div block.
Avi Lumelsky
Gal Elbaz
Research
Shadow Vulnerability
Oligo Wins SC Award for Best Supply Chain Security Solution
This is some text inside of a div block.
Nadav Czerninski
General
Oligo Named Finalist by SC Awards for Best Supply Chain Solution of 2024
This is some text inside of a div block.
Nadav Czerninski
General
TensorFlow Keras Downgrade Attack: CVE-2024-3660 Bypass
This is some text inside of a div block.
Avi Lumelsky
AI
Research
0.0.0.0 Day: Exploiting Localhost APIs From the Browser
This is some text inside of a div block.
Avi Lumelsky
Research
Shadow Vulnerability
Recent CrowdStrike Outage Emphasizes the Need for eBPF-Based Sensors
This is some text inside of a div block.
Guy Kaplan
Security
Now Showing in the Oligo Application Defense Platform: Direct and Transitive Dependencies
This is some text inside of a div block.
Jeanette Sherman
Product
Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough
This is some text inside of a div block.
Uri Katz
Guy Kaplan
Avi Lumelsky
Research
Shadow Vulnerability
Critical RCE Vulnerabilities in OpenSSH (CVE-2024-6387, CVE-2024-6409) - How to Detect and Mitigate
This is some text inside of a div block.
Guy Kaplan
Security
App-Level eBPF Applications - User vs. Kernel Probes
This is some text inside of a div block.
Avi Lumelsky
Security
Practical AppSec, Part II: The Limitations of “Shift Left” (and Why Runtime Is the Right Time)
This is some text inside of a div block.
Jeanette Sherman
Security
Oligo ADR in action: PaddlePaddle Shadow Vulnerability
This is some text inside of a div block.
Nitzan Mousseri
Product
Shadow Vulnerability
Oligo Security Named to Rising in Cyber 2024
This is some text inside of a div block.
Nadav Czerninski
General
Oligo ADR in Action: LLM Prompt Injection
This is some text inside of a div block.
Nitzan Mousseri
Product
Shadow Vulnerability
Deep Dive on the XZ Backdoor: CVE 2024-3094 Enables Remote Code Execution in XZ (5.6.0-5.6.1)
This is some text inside of a div block.
Jeanette Sherman
Security
XZ-actly What You Need (CVE-2024-3094): Detecting Exploitation with Oligo
This is some text inside of a div block.
Guy Kaplan
Uri Katz
Nitzan Mousseri
Product
ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild
This is some text inside of a div block.
Avi Lumelsky
Guy Kaplan
Gal Elbaz
Research
Shadow Vulnerability
The Definitive Guide to Runtime Vulnerability Prioritization
This is some text inside of a div block.
Harel Hilu
Security
On Loaded vs. Executed Libraries During Runtime – What This Means for Reachability
This is some text inside of a div block.
Guy Kaplan
Security
Practical AppSec, Part I: Why Devs Don’t Trust AppSec Findings (And What You Can Do About It)
This is some text inside of a div block.
Jeanette Sherman
Security
Oligo’s Best Features of 2023 (And an Exciting Sneak Peek at 2024)
This is some text inside of a div block.
Avshalom Hilu
Product
AppSec in the Age of AI: Predicting Challenges and Opportunities
This is some text inside of a div block.
Nadav Czerninski
Security
ShellTorch: Multiple Critical Vulnerabilities in PyTorch TorchServe Threatens Countless AI Users
This is some text inside of a div block.
Idan Levcovich
Guy Kaplan
Gal Elbaz
Research
AI
Oligo and WebP 0-Day: Keep Calm and Check the Runtime Context
This is some text inside of a div block.
Gal Elbaz
Security
4 Tips for Adopting a Practical Approach to AppSec
This is some text inside of a div block.
Robert Kugler
Security
Closing the Gap: Exploring SCA Limitations and the Rise of Runtime Security
This is some text inside of a div block.
Scaling Runtime Security: How eBPF is Solving Decade-Long Challenges
This is some text inside of a div block.
Noam Issachar
Product
Revolutionizing the Game of Application Security
This is some text inside of a div block.
Avshalom Hilu
General
Introducing Oligo: Leading Application Security to Runtime
This is some text inside of a div block.
Nadav Czerninski
Gal Elbaz
Avshalom Hilu
General
State of AI in production 2026
This is some text inside of a div block.