Amit Sheps

Amit Sheps

Director of Product Marketing
Amit Sheps brings 15+ years of cybersecurity expertise to his role as Director of Product Marketing at IONIX, where he specializes in external attack surface management. He has been instrumental in delivering solutions that secure operational technology (OT), Internet of Things (IoT), and cloud environments against sophisticated cyber threats. Amit helps organizations identify and mitigate vulnerabilities across their expanding digital footprint by effectively communicating security strategies and best practices.

Posted by Amit Sheps

  • Graphic illustrating Cross-Site Scripting (XSS): Types, Detection, and Prevention. The graphic features code snippets within colored circles and shields, symbolizing security.

    Cross-Site Scripting (XSS): Types, Detection, and Prevention

  • Urgent security alert from Ionix regarding zero-day vulnerabilities CVE-2025-4427 and CVE-2025-4428 affecting Ivanti EPMM, allowing authentication bypass and remote code execution.

    Exploited! Ivanti EPMM Authentication Bypass & Remote Code Execution (CVE-2025-4427 & CVE-2025-4428)

  • PCI DSS 4.0 Compliance Guide: From Confusion to Confidence

    PCI DSS 4.0 Compliance Guide: From Confusion to Confidence    

  • Graphic illustrating web application security principles, with icons representing code, shields, and geometric shapes on a peach background. The text 'WEB APPLICATION SECURITY: SECURITY BY DESIGN PRINCIPLES' is prominently displayed.

    Web Application Security: Security-by-Design Principles

  • Graphic explaining why broken authentication and session management is a top security risk. It includes icons representing security, code, and an unlocked padlock.

    Why Broken Authentication and Session Management is a Top Security Risk

  • Infographic depicting various vulnerability scanning and assessment tools for web application security.

    Web Application Security: The Various Types of Vulnerability Scanning and Assessment Tools

  • Graphic explaining web application security, showing a question mark, an exclamation point in a triangle, a shield, and code symbols.

    What Is Web Application Security? 

  • Graphic showing a question about whether the MCP is an industry game-changer or another NFT bubble.

    MCP: Industry Game-Changer or Another NFT Bubble?

  • Exploited! Warning sign indicating a vulnerability: CVE-2025-2775, SYSAID on-prem XML external entity vulnerability.

    Exploited! SysAid On-Prem XML External Entity Vulnerability (CVE-2025-2775)

  • Ionix's article on asset discovery, emphasizing that it's a starting point rather than a complete security strategy. The graphic shows an ascending series of blue and orange circles.

    Asset Discovery: A Starting Point, Not a Security Strategy

  • Alert: A zero-day vulnerability update announcement shows that an exploited unauthenticated file upload vulnerability (CVE-2025-31324) in SAP NetWeaver Visual Composer has been discovered.

    Exploited! SAP NetWeaver Visual Composer Unauthenticated File-Upload Vulnerability (CVE-2025-31324) 

  • Alert: Zero-day vulnerability update for Erlang/OTP SSH. Unauthenticated remote code execution (CVE-2025-32433) has been exploited.

    Exploited! Erlang/OTP SSH Unauthenticated Remote Code Execution Vulnerability (CVE-2025-32433)