Tal Zamir is Chief Technology Officer at IONIX, where he leads the technical vision for the company's agentic AI-powered external attack surface management platform. He brings more than two decades of cybersecurity and infrastructure engineering experience. He co-founded Hysolate, the first virtual air gap endpoint isolation platform, and later served as CTO at Perception Point, an AI-based email and SaaS security platform acquired by Fortinet. He spent several years in the VMware CTO office following the acquisition of desktop virtualisation startup Wanova. Tal holds an M.Sc. in Computer Science from the Technion Institute of Technology (Summa Cum Laude), is named on more than 25 US patents, and was an RSA Innovation Sandbox finalist. He writes on vulnerability research, AI security risks, attack surface management, and emerging threat techniques.
Posted by Tal Zamir
Tal Zamir
December 25, 2025
CVE-2025-68613: Critical RCE in n8n via expression injection
Tal Zamir
September 26, 2025
CVE-2025-20333: Authenticated RCE in Cisco ASA / FTD VPN Web Server
Itay Paz Slavin
September 22, 2025
Exposed AI Agents in the Wild: How a Public MCP Server Let Us Peek Inside Its Host
Tal Zamir
September 21, 2025
CVE-2025-10035 Critical Remote Code Execution in Fortra GoAnywhere MFT
Tal Zamir
September 17, 2025
How IONIX Protects You in the AI Gold Rush
Tal Zamir
September 10, 2025
CVE-2025-42944 — Insecure Deserialization in SAP NetWeaver
Tal Zamir
September 9, 2025
Unauthenticated SSRF in Ditty WordPress Plugin (CVE-2025-8085)
Tal Zamir
August 29, 2025
FreePBX Authentication Bypass Leading to SQL Injection and RCE (CVE-2025-57819)
Tal Zamir
August 27, 2025
CVE-2025-7775: Memory Overflow Vulnerability in Citrix NetScaler ADC and Gateway
Tal Zamir
August 7, 2025
CVE‑2025‑54253 & CVE‑2025‑54254 in Adobe Experience Manager Forms – What You Must Know
Tal Zamir
August 5, 2025
Remote DNS Manipulation at Scale: How IONIX Uncovered 20,000 Malicious Subdomains from a Single Abused NS Record
Guides
In Security Operations, You Must Understand the Power of MCP