🚀 Big news from Oligo! We’re thrilled to announce our $50M Series B funding round, backed by an outstanding group of investors: Greenfield Partners, Red Dot Capital Partners, Strait Capital, Ballistic Ventures, Lightspeed, and TLV Partners. This milestone will fuel our mission to revolutionize application security—empowering organizations to detect and respond to the vulnerabilities that truly matter. With this investment, we’re accelerating innovation, expanding our impact, and continuing to push the boundaries of Application Detection and Response (ADR). A huge thank you to our customers, partners, and investors for their trust and support. The future of runtime security starts now! Read the full announcement: https://lnkd.in/dzZp9W6F #Cybersecurity #ADR #ApplicationSecurity #Funding
Oligo Security
Computer and Network Security
Tel Aviv עוקבים, Israel 7,251
Seeing Deeper to Secure Applications in Runtime
עלינו
Oligo is on a mission to secure every application against intrusions. The Oligo Application Defense Platform gives security teams powerful capabilities to observe application components, detect intrusions, and mitigate threats, all while keeping developers focused on features—not fixes. Oligo’s eBPF-based sensor determines exploitability and identifies compromises instantly—even when attackers exploit unknown vulnerabilities.
- אתר אינטרנט
-
https://www.oligo.security/
קישור חיצוני עבור Oligo Security
- תעשייה
- Computer and Network Security
- גודל החברה
- 51-200 עובדים
- משרדים ראשיים
- Tel Aviv, Israel
- סוג
- בבעלות פרטית
מוצרים
Oligo Security
Vulnerability Scanners
Oligo Security is on a mission to proactively protect software throughout the development lifecycle. With contextual detection of exploitable flaws in all application code, the Oligo Defense Platform is the only product on the market that can fully determine vulnerability exploitability and detect real-time indicators of compromise in applications.
מיקומים
-
הראשי
Tel Aviv, Israel 6473921, IL
עובדים ב- Oligo Security
עדכונים
-
One of the biggest challenges in #AppSec comes from a lack of understanding the function within a given library that is vulnerable - and scaling this is practically impossible for most organizations. Learn how Oligo enriches CVE data to: 🌎 Identify 1100% more vulnerable functions than any other CVE advisory worldwide 🎯 Enable greater precision for customers by helping them focus on vulnerabilities where an executed vulnerable function has been identified 🔒 Accelerate mean-time-to-remediate (MTTR) by knowing and identifying a resolution for the exact function that introduces a vulnerability Learn more 👉 https://lnkd.in/eWjpf7Js
-
-
Join us on April 1st for an impactful discussion on the risks that #GenAI introduces to organizations and how we are helping customers combat them. And no, this is NOT an April Fools joke... Our #ADR really secures GenAI like it’s just any other application 🔒 Avi Lumelsky Mic McCully Noah Simon Register below 👇👇 https://lnkd.in/eyMSY5Gp
Generative AI is transforming businesses, but its rapid adoption introduces new security challenges. How can organizations safeguard their AI-powered applications against emerging threats? Join this expert-led session to gain insights on: ✔️ Key vulnerabilities and attack campaigns targeting GenAI applications, uncovered by Oligo’s research team ✔️ Security strategies for safe GenAI adoption across the enterprise ✔️ The role of Application Detection & Response (ADR) in detecting and mitigating AI-driven threats in real time 📅 Register now to stay ahead of evolving GenAI risks.
תוכן זה אינו זמין כאן
גישה לתוכן זה ועוד באפליקציית LinkedIn
-
Tune in on March 27th for an impactful #AppSec conversation as part of the #RSAC Innovation Showcase series. Our co-founder and CTO Gal Elbaz will take part in a panel, featuring Mark Kraynak (Acrew Capital), Jim Manico (Manicode Security), Elad Menahem (Cato Networks), and Jonathan Schneider (Moderne) to dive into: 📉 The limitations of traditional application security approaches and the need for solutions that can do more than find issues 🤖 How AI and machine learning are transforming vulnerability detection and code remediation 🎯 How runtime-based detection and remediation enhance application security You don't want to miss it. Register here: https://lnkd.in/ebTkwGtH
-
-
Pumped to be kicking off Cybertech Global Tel Aviv 2025 in style 🍸 Join us and our friends at TLV Partners for some great cocktails, hors d’oeuvres, and even better networking opportunities with the best and brightest minds in security. Request to get in on the fun here: https://lu.ma/v9l8ecs8 Token Security Cyata
-
-
Looking forward to SINET Silicon Valley later this week! Join us at the Computer History Museum in Mountain View for an exciting day of thought leadership and building connections with some of the best in security. Check out the incredible agenda and register here: bit.ly/4gQFH2I Robert Rodriguez Heather Rodriguez
-
-
💸 The largest crypto heist in history - what you should know. You've probably seen that North Korean attackers pulled off what is believed to be the largest crypto heist in history a few weeks ago, stealing an estimated $1.5B from crypto exchange Bybit. Our team dug into the details to give you the rundown. In short, the attackers leveraged an open-source library for RCE to ultimately gain control of Bybit’s infrastructure. The kicker? The majority of organizations have no way to detect and prevent malicious behavior at the application-level and have to rely on post-exploit indicators to know an attack is happening in the first place. In our overview, we cover: 💻 The attack methods used to pull off the heist - shout out to SlowMist for the amazing report 📚 How a vulnerability in a popular open-source library allowed attackers to pull off the biggest known heist in history 🔒 ADR's ability to consistently monitor and profile the normal behavior of open-source libraries to alert organizations the moment an unintended action takes place Full analysis here: https://lnkd.in/enVvHQv7
-
-
Hackers are finding new ways to exploit AI vulnerabilities, and without proper testing, your compliance and security could be at risk. Join Nikita Goman, Scytale’s Penetration Testing Team Leader, and Oligo's AI Security Research Lead, Avi Lumelsky, for a deep dive into: 🔎 The real security risks lurking in AI models 💻 How attackers exploit vulnerabilities in GenAI 🔒 Strategies to secure AI and maintain SOC 2 compliance 📅 Tuesday, March 18th, 11am-12pm ET Register here: https://lnkd.in/eMww9yRn
-
-
Step into the world of our runtime sensor - the most efficient yet lightweight sensor in the industry, and the key driving force behind Oligo’s ability to deliver real-time #AppSec and #ADR to customers. In his latest blog, Oligo software architect, Nathan Quibech, takes you on a journey through the different observability breakthroughs Oligo has made to create a sensor that consumes over 250% less memory than others AND outperforms them in runtime. These innovations include: ✅ A refined logging strategy with structured logs, rate-limiting, and eBPF integration ✅ Advanced metrics dashboards using Prometheus and Grafana to speed up troubleshooting ✅ Optimized sensor performance with continuous CPU and memory profiling ✅ Data-driven decision making through event warehousing and large-scale analytics Read more: https://lnkd.in/ew5N3kg5
-
-
A few weeks ago, North Korean hackers pulled off the largest cryptocurrency heist in history, stealing nearly $1.5 billion in Ethereum from crypto exchange Bybit. Like the majority of applications, open-source software components are the backbone of cryptocurrency platforms. And it appears an exploit of an open-source library (pyyaml) was the source of intrusion into Bybit’s infrastructure - enabling the attackers to remotely execute code and take control over the target computers and servers. At Oligo, we use Deep Application Inspection to profile the behavior of libraries to detect and stop deviations from their normal behavior, just like the exploit of pyyaml. Learn how one of the largest crypto exchanges in the world uses Oligo to: 🔒 Monitor and profile the behavior of application components to detect and prevent malicious activity. 🎯 Pinpoint vulnerable dependencies at runtime to understand those that are exploitable and require immediate attention. 📉 Reduce the noise that comes with traditional AppSec approaches by over 80%. https://lnkd.in/eJuVi97y