Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Oligo Security Introduces Application Attack Matrix to Map App Layer Threats
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
CybersecurityTechnology

Oligo Security Introduces Application Attack Matrix to Map App Layer Threats

Highlights

  • Oligo Security launched the Application Attack Matrix for application-layer threats.

  • The framework aims to address limitations in the MITRE ATT&CK model for apps.

  • Collaboration is encouraged for ongoing evolution and wider adoption of the matrix.

Ethan Moreno
Last updated: 8 July, 2025 - 8:09 pm 8:09 pm
Ethan Moreno 4 days ago
Share
SHARE

A new initiative is attempting to address persistent blind spots in cybersecurity caused by application-level attacks, which commonly evade traditional detection methods. Oligo Security, a Tel Aviv-based company established in 2022, has developed the Application Attack Matrix—an open-source taxonomy designed to catalogue application-centric threats and mitigation techniques. Increased reliance on complex software systems and the proliferation of cloud applications have intensified the need for more precise and actionable frameworks to help organizations secure the application layer. While many organizations rely on the established MITRE ATT&CK framework to understand attacker behavior, practical experience has revealed several deficiencies in it when applied to real-world application-based intrusions.

Contents
What Sets the Application Attack Matrix Apart?How Does the Matrix Address App-Layer Blind Spots?Is Community Collaboration Central to This Approach?

Similar efforts over the past few years have highlighted gaps in current threat modeling, especially related to attacks within the software supply chain and application runtime environments. Researchers and practitioners have debated the effectiveness of broad frameworks like MITRE’s, as these sometimes group disparate threats under general headings. Initiatives parallel to Oligo Security’s have also called for greater specificity and community collaboration, but few have focused exclusively on dissecting application-layer tactics across various deployment architectures such as containers, serverless, and hybrid cloud setups.

What Sets the Application Attack Matrix Apart?

Whereas the MITRE ATT&CK framework outlines tactics and techniques at a broad level—often encompassing a variety of application attacks under single entries—the Application Attack Matrix aims to deliver a more nuanced breakdown. According to Oligo Security’s co-founder and CTO, Gal Elbaz, this matrix dissects incidents down to the root behaviors within the application environment.

“Most of the approaches that we know today are focused on the post-exploit technique, and on the infrastructure and endpoint,”

he said, explaining that this method often leaves gaps in understanding the true intrusion paths attackers exploit.

How Does the Matrix Address App-Layer Blind Spots?

By mapping pre-intrusion, intrusion, post-intrusion, and impact phases, the matrix distinguishes specific exploitation methods at the application level, such as command injection, Lightweight Directory Access Protocol (LDAP) injection, XML injection, and SQL injection. These techniques are often hidden within catch-all MITRE categories, making precise detection and response difficult. The matrix also differentiates between issues like exploited vulnerabilities, bypassed controls, unauthorized logins, or compromises originating from the software supply chain, including vulnerable packages for Python, Java, Go, or Node.

Is Community Collaboration Central to This Approach?

Oligo Security positions the Application Attack Matrix as a collaborative, ongoing project with contributions welcomed from the broader security community. The company indicates that support from threat intelligence experts, enterprise security leaders, and organizations including MITRE has shaped the framework’s early development. According to Avi Lumelsky, an AI security researcher at Oligo Security, the matrix deconstructs attack techniques for various environments, from regular servers to Kubernetes containers, without tying itself to specific platforms or service providers.

Oligo’s focus on open sourcing the Application Attack Matrix through platforms such as GitHub reflects a trend toward community-developed security resources. The framework serves not only as a tool for categorizing application-layer threats but also as a foundation for developing more targeted threat intelligence, incident response playbooks, and defense strategies. By centering on real-world application attack scenarios, including attacks like Log4Shell, MOVEit, and the SolarWinds incident, stakeholders can better understand attacker tactics that typically go undetected by traditional security controls.

Deployment of this new matrix can potentially shift organizations’ focus from solely infrastructure and endpoint defense to encompassing deeper application-layer visibility. As escalating application complexity introduces new vulnerabilities, a refined understanding of intrusions at the software layer becomes increasingly relevant. The matrix offers organizations the means to more accurately distinguish classes of attack and tie mitigations to the underlying techniques, potentially reducing incident impact and improving detection. For security professionals, adopting frameworks like the Application Attack Matrix may reveal previously unrecognized risks, especially in cloud-native and microservice-heavy architectures. Evaluating and adapting to new frameworks in cooperation with the security community could be valuable for organizations seeking to strengthen app-focused defense strategies.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Virtru Raises $50 Million, Secures Data as AI Use Grows

AI Drives American Professional Services to Rethink Their Future

Yoshua Bengio Pushes LawZero to Counter Agentic A.I. Risks

French Police Hold Ex-Penn State Player on U.S. Ransomware Charge

Geoffrey Hinton Warns Nations to Address AI’s Rapid Risks

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Tesla Analysts Debate Oversight and Focus of Elon Musk’s Leadership
Next Article Salesforce Uses AI to Reshape Workforce and Hiring Practices

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Players Tackle Wordle’s Latest Challenge With Fresh Strategies
Gaming
Supply Chain Robotics Experts Address Industry Setbacks and Progress
AI Robotics
Canadian Officials Clear Tesla in Zero-Emission Vehicle Rebate Probe
Electric Vehicle
Kraken Robotics Secures $115M to Boost Marine Systems Expansion
Robotics
Tesla Installs 18 New Megachargers at PepsiCo’s Charlotte Facility
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?