IONIX

Tel Aviv, Israel
2016
  |  By Nethanel Gelernter
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges and perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474.
  |  By Amit Sheps
IONIX today announced the release of our Cloud Exposure Validator, a tool designed to reduce cloud vulnerability management noise shifting focus to findings that represent the biggest threats. The Validator addresses the growing challenges organizations face in managing cloud security risks effectively. This blog post explains how.
  |  By Nethanel Gelernter
A critical authentication bypass vulnerability has been identified in the WordPress plugin Really Simple Security (formerly known as Really Simple SSL), affecting both its free and Pro versions.
  |  By Amit Sheps
Third-party vendors are essential for many business operations, from cloud providers to SaaS applications. However, they add to the ever-growing scope of an organization’s risk management. Third-party risk management (TPRM) is the process of identifying, assessing, and mitigating the security risks posed by vendors, contractors, and service providers that have access to your organization’s data or systems.
  |  By Nethanel Gelernter
Two Citrix vulnerabilities (CVE-2024-8068 and CVE-2024-8069) can potentially lead to unauthenticated remote code execution. Note: according to the vendor, privilege escalation to NetworkService Account access in Citrix Session Recording and limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording is possible when an attacker is an authenticated user in the same intranet.
  |  By Nethanel Gelernter
According to security researcher nol_tech CVE-2024–50340 is a critical vulnerability (CVSS: 7.3) affecting Symfony applications when the PHP directive register_argc_argv is enabled. By appending ?+--env=dev to a URL, attackers can force the application into the dev environment, granting remote access to the Symfony profiler. This exposure can lead to the leaking of sensitive information and potentially executing arbitrary code.
  |  By Amit Sheps
Web applications are many organizations’ primary point of contact with their customers, but they’re also one of their greatest vulnerabilities. Most web applications contain at least one exploitable vulnerability, and the repercussions of a successful exploit can be devastating for an organization or its customers. In this article Web application security focuses on identifying, remediating, and defending web applications to reduce an organization’s vulnerability to attack.
  |  By Ohad Shushan
In 2023, the Los Angeles Police Department responded to a series of triggered alarms at a GardaWorld cash storage warehouse in a suburban neighborhood in the San Fernando Valley. All thirteen were deemed to be false positives. In this article A year later, four more alarms rang at the same facility: one just before midnight on March 30th and the other three on Easter Day.
  |  By Nethanel Gelernter
This post is based on ongoing security research – and will continue to be updated as we get additional information…
  |  By Amit Sheps
Vulnerability management programs attempt to identify and correct software vulnerabilities before they pose a significant threat to an organization’s cybersecurity. To learn more about how to design and implement a vulnerability management program, check out these resources: This article describes the tools that an organization will need to implement an effective vulnerability management program.
  |  By IONIX
How to Expose Critical Threats and Proactively Prevent Breaches In today's cyber landscape, identifying and mitigating threats from an attacker's perspective is not just an option – it's a necessity. Watch this insightful fireside chat with Forrester Senior Analyst Erik Nost and IONIX CEO Marc Gaffan, as they dive into the world of Threat Exposure Management (TEM) and its pivotal role in safeguarding your business.
  |  By IONIX
Growing digital connectivity has led to the rise of digital supply-chain attacks. This session will explain, demonstrate, and provide statistics about the complexity of the problem and about attacks that arose due to dependencies on external infrastructures. While there is no simple solution to the problem, we will present a strategy to reduce exposure and create processes to avoid such vulnerabilities.
  |  By IONIX
Senior principal analyst and ESG fellow John Oltsik discusses Improving the Effectiveness of Attack Surface Management Programs.
  |  By IONIX
In a world where organizations cannot fix everything, security and IT teams need a practical way to identify and act on critical exposures. IONIX Threat Exposure Radar exposes critical risks so you can effectively reduce risk and improve your security posture.
  |  By IONIX
  |  By IONIX
​Gain control of your external attack surface and digital supply chain with Cyberpion and Azure Sentinel Nethanel Gelernter, Cyberpion
  |  By IONIX
The Apache Log4j vulnerability will likely continue to create challenges for security teams for months to come, and we want you to be prepared.
  |  By IONIX
We are kicking off December and Talking Cloud with the Co-Founder and CBO at Cyberpion. If you're like me, you're wondering how to pronounce the name of the company, let alone exactly what they do in the cloud. You'll not only learn how to properly pronounce the name of the company but also learn where the name came from and the unique solution they have built to address the hyper-connected world we all live in today. Hear my fun and informative discussion with Ran Nahamis.
  |  By IONIX
Cyberpion's Ecosystem Security platform enables security teams to identify and neutralize the rising threats stemming from vulnerabilities within the online assets throughout an enterprise's far-reaching, hyperconnected ecosystem.
  |  By IONIX
Download this complimentary report and learn why Omdia sees Cyberpion as well placed to carve out a share of the expanding EASM market, given the breadth of its current offering and its plans for where it needs to take its technology next.
  |  By IONIX
The move to the cloud has exponentially increased this phenomenon: The IT team is no longer required for provisioning storage, running an application, or configuring a server. Along with the growth in Shadow IT, the security risk has grown as well. Potential backdoors have been created and internal data has moved online, violating compliance requirements and compromising the organization's security posture.
  |  By IONIX
Full external attack surface visibility is just the first step to safeguarding your organization. Cyberpion goes beyond visibility to combine an attack surface vulnerability assessment for each connected asset, whether your own (first party) or from a third party. Moreover, the platform actively responds to major vulnerabilities, like dangling DNS records, by taking temporary ownership of the relevant IP address or subdomain to prevent it from falling into the wrong hands.
  |  By IONIX
Cybersecurity teams need to develop and maintain a set of practices around their online attack surface. These practices must include attack surface visibility and mapping of third-party connections as well as constant assessment of the risks of these connections. Controls must include the ability to detect and alert on risky or broken connections, coupled with automated remediation when feasible.

IONIX is the only EASM solution that discovers the full extent of your online risk exposure and actively protects your hyper-connected external attack surface.

With growing reliance on SaaS, Cloud, APIs, and 3rd party services, hyper-connectivity presents the fastest-growing and most serious risk to enterprises like yours. Mostly invisible, unmanaged, and everchanging, exposed hyper-connected assets, whether yours or your business partners, are easy entry points for attackers to exploit.

Operate Confidently Online with IONIX:

  • Attack Surface Discovery: Identify the internet-facing assets you own and their extended connections with unmatched coverage and precision.
  • Risk Assessment: Evaluate each discovered asset, its connectivity, and related kill chains for exploitable vulnerabilities and risks.
  • Comprehensive Reporting: Identify assets and connections that are no longer in use so you reduce your attack surface and exposure to risk.
  • Active Protection: Support your security team with Active Protection, so you prevent exploitation of your most vulnerable assets.
  • Risk Prioritization: Accelerate mitigation with a prioritized list of action items to help your security team effectively focus their efforts.
  • Workflow Integration: Integrate your current security tools including Microsoft Azure Sentinel, ServiceNow, Atlassian Jira, Splunk, and Cortex XSOAR.

Discover and Protect Your Attack Surface.