What does Mythos mean for ASM? See here

Tal Zamir

Tal Zamir

Chief Technology Officer
Tal Zamir is Chief Technology Officer at IONIX, where he leads the technical vision for the company's agentic AI-powered external attack surface management platform. He brings more than two decades of cybersecurity and infrastructure engineering experience. He co-founded Hysolate, the first virtual air gap endpoint isolation platform, and later served as CTO at Perception Point, an AI-based email and SaaS security platform acquired by Fortinet. He spent several years in the VMware CTO office following the acquisition of desktop virtualisation startup Wanova. Tal holds an M.Sc. in Computer Science from the Technion Institute of Technology (Summa Cum Laude), is named on more than 25 US patents, and was an RSA Innovation Sandbox finalist. He writes on vulnerability research, AI security risks, attack surface management, and emerging threat techniques.

Posted by Tal Zamir

  • CVE-2025-68613: Critical RCE in n8n via expression injection

  • CVE-2025-20333: Authenticated RCE in Cisco ASA / FTD VPN Web Server

  • Exposed AI Agents in the Wild: How a Public MCP Server Let Us Peek Inside Its Host

  • CVE-2025-10035 Critical Remote Code Execution in Fortra GoAnywhere MFT

  • AI Goldrush Cybersecurity

    How IONIX Protects You in the AI Gold Rush

  • CVE-2025-42944 — Insecure Deserialization in SAP NetWeaver

  • Unauthenticated SSRF in Ditty WordPress Plugin (CVE-2025-8085)

  • CVE-2025-57819

    FreePBX Authentication Bypass Leading to SQL Injection and RCE (CVE-2025-57819)

  • Netscaler Citrix CVE-2025-7775

    CVE-2025-7775: Memory Overflow Vulnerability in Citrix NetScaler ADC and Gateway

  • CVE‑2025‑54253-CVE‑2025‑5425.

    CVE‑2025‑54253 & CVE‑2025‑54254 in Adobe Experience Manager Forms – What You Must Know

  • Remote DNS Manipulation at Scale

    Remote DNS Manipulation at Scale: How IONIX Uncovered 20,000 Malicious Subdomains from a Single Abused NS Record 

  • company

    In Security Operations, You Must Understand the Power of MCP