ETFOptimize | High-performance ETF-based Investment Strategies

Quantitative strategies, Wall Street-caliber research, and insightful market analysis since 1998.


ETFOptimize | HOME
Close Window

New Application Attack Matrix Establishes Industry Standard for Protecting Modern Cloud Applications

Collaboration with world-renowned cyber leaders yields a timely framework for how attackers target modern enterprise applications

Oligo Security, the runtime security company, today announced the launch of the Application Attack Matrix, a standardized framework to categorize tactics, techniques, and procedures (TTPs) for application-layer attacks. Developed in collaboration with leading experts in threat intelligence and application security, the matrix was shaped with input from contributors from companies like AWS, Google Cloud (Mandiant), Intel, Microsoft, Salesforce, and other organizations at the forefront of cybersecurity. It is designed to help security teams, developers, and threat hunters better understand how attackers target modern applications, build more effective defenses, and bridge the gap between application security and broader security operations.

The sharp rise in software vulnerabilities year over year has created major challenges for security teams working to protect applications – even at small scales. Adversaries have taken advantage of this surge, with vulnerability exploits overtaking phishing as an initial attack vector1. Vulnerability exploits have also remained one of the top methods used by attackers to gain access to organizations for the past 5 years in Mandiant investigations2, with many critical vulnerabilities exploited within 48 hours of disclosure3.

“Attackers target applications more today than any point in history, and it is time for the industry to stop focusing on treating post-exploit symptoms and get to the root cause: the initial exploit attempts that happen in the application layer,” said Gal Elbaz, co-founder and CTO, Oligo Security. “We started this framework to help defenders understand how applications are targeted so that the industry can act together to bolster defenses. We invite anyone who wants to contribute to join us in making this a vendor agnostic, collaborative effort that hopes to create a standard methodology for protecting against application attacks.”

Application-layer attacks target applications in production environments, including web and server-side apps, and often bypass traditional detection systems to exploit vulnerabilities deep within the software stack. Current security solutions and frameworks are primarily focused on infrastructure or workload-level tactics and techniques, such as cloud and mobile technologies, networks, operating systems and endpoints. This leaves a gap in standardization for defending against application-layer attacks that increasingly stem from vulnerability exploitation.

To close this gap, the Application Attack Matrix focuses on:

  • Application Attack Surface: Categorizing threats specific to production environments, including web and server-side applications.
  • Adversary Tactics and Techniques: Documenting the tactics attackers use to exploit business logic, inject malicious code, abuse authentication mechanisms, and bypass application-layer defenses.
  • Response and Mitigation: Providing structured guidance on detection, mitigation, and incident response tailored to application security.
  • Integration into Security Operations: Enabling security operations and threat intelligence teams to use the framework in conjunction with existing attack matrices to create holistic defense strategies.

“The level of threat activity originating in the application layer makes an application-focused attack matrix critical,” said Jaime Blasco, Ballistic Ventures Threat Intelligence Advisor and Creator of Open Threat Exchange. “Applications have become beyond essential to business operations, and organizations as a whole are struggling with inconsistent security strategies, incomplete threat coverage, and ineffective incident response for modern applications. This initiative fills an important gap, empowering organizations to defend against the next-generation of threats that increasingly originate and stay in the application layer.”

More information:

Sources:

  1. https://www.verizon.com/business/resources/reports/dbir/
  2. https://cloud.google.com/security/resources/m-trends
  3. https://vulncheck.com/blog/2024-exploitation-trends

About Oligo Security

Oligo protects applications against attackers with the industry’s leading runtime security platform. With deep application inspection through real-time monitoring and context-aware analysis, Oligo enables customers to instantly see all of the vulnerabilities in their environments, identify those that matter most, and stop application-based attacks in their tracks. https://www.oligo.security/

New Application Attack Matrix establishes industry standard for protecting modern cloud applications

Contacts

Recent Quotes

View More
Symbol Price Change (%)
AMZN  210.00
+2.08 (1.00%)
AAPL  264.18
-8.77 (-3.21%)
AMD  200.21
-3.47 (-1.70%)
BAC  49.83
-2.47 (-4.72%)
GOOG  311.43
+4.28 (1.39%)
META  648.18
-8.83 (-1.34%)
MSFT  392.74
-8.98 (-2.24%)
NVDA  177.19
-7.70 (-4.16%)
ORCL  145.40
-4.91 (-3.27%)
TSLA  402.51
-6.07 (-1.49%)
Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the Privacy Policy and Terms Of Service.


 

IntelligentValue Home
Close Window

DISCLAIMER

All content herein is issued solely for informational purposes and is not to be construed as an offer to sell or the solicitation of an offer to buy, nor should it be interpreted as a recommendation to buy, hold or sell (short or otherwise) any security.  All opinions, analyses, and information included herein are based on sources believed to be reliable, but no representation or warranty of any kind, expressed or implied, is made including but not limited to any representation or warranty concerning accuracy, completeness, correctness, timeliness or appropriateness. We undertake no obligation to update such opinions, analysis or information. You should independently verify all information contained on this website. Some information is based on analysis of past performance or hypothetical performance results, which have inherent limitations. We make no representation that any particular equity or strategy will or is likely to achieve profits or losses similar to those shown. Shareholders, employees, writers, contractors, and affiliates associated with ETFOptimize.com may have ownership positions in the securities that are mentioned. If you are not sure if ETFs, algorithmic investing, or a particular investment is right for you, you are urged to consult with a Registered Investment Advisor (RIA). Neither this website nor anyone associated with producing its content are Registered Investment Advisors, and no attempt is made herein to substitute for personalized, professional investment advice. Neither ETFOptimize.com, Global Alpha Investments, Inc., nor its employees, service providers, associates, or affiliates are responsible for any investment losses you may incur as a result of using the information provided herein. Remember that past investment returns may not be indicative of future returns.

Copyright © 1998-2017 ETFOptimize.com, a publication of Optimized Investments, Inc. All rights reserved.