Amit Sheps

Amit Sheps

Director of Product Marketing
Amit Sheps brings 15+ years of cybersecurity expertise to his role as Director of Product Marketing at IONIX, where he specializes in external attack surface management. He has been instrumental in delivering solutions that secure operational technology (OT), Internet of Things (IoT), and cloud environments against sophisticated cyber threats. Amit helps organizations identify and mitigate vulnerabilities across their expanding digital footprint by effectively communicating security strategies and best practices.

Posted by Amit Sheps

  • company

    OWASP Top 10: Server-Side Request Forgery (SSRF)

  • company

    OWASP Top 10: Identification and Authentication Failures

  • company

    OWASP Top 10: Software and Data Integrity Failures

  • Exploited! Alert announcing a critical unauthenticated access vulnerability (CVE-2025-2825) in CrushFTP.

    Exploited: Critical Unauthenticated Access Vulnerability in CrushFTP (CVE-2025-2825)

  • Security alert graphic with red color scheme and a warning symbol. Text states 'EXPLOITED! Vulnerability Update' and details the Kentico Xperience Staging Service Authentication Bypass vulnerabilities (CVE-2025-2746 and CVE-2025-2747).

    Exploited! Kentico Xperience Staging Service Authentication Bypass Vulnerabilities (CVE-2025-2746 & CVE-2025-2747)

  • company

    OWASP Top 10: Vulnerable and Outdated Components

  • company

    OWASP Top 10: Security Misconfiguration Vulnerabilities

  • company

    OWASP Top 10: Insecure Design

  • Alert: Multiple remote code execution vulnerabilities in Ingress Nginx Controller for Kubernetes have been exploited.

    Exploited! Ingress-NGINX CONTROLLER FOR Ingress-NGINX RCE (CVE-2025-1974, 1097, 1098, 24514) – Patch Now | IONIX

  • company

    OWASP Top 10: Cryptographic Failures

  • Exploit alert for CVE-2025-24813, an Apache Tomcat path equivalence vulnerability.

    Exploited! Apache Tomcat Path Equivalence Vulnerability (CVE-2025-24813)

  • Diagram comparing effective and broken access control. Effective access control shows authorized users granted access and unauthorized users denied. Broken access control shows authorized users granted access, but also unauthorized users granted access due to poor access control.

    OWASP Top 10: Broken Access Control