Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Aisy Launches Out of Stealth to Transform Vulnerability Management
    Cybersecurity

    Aisy Launches Out of Stealth to Transform Vulnerability Management

    adminBy adminJanuary 31, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Vulnerability
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Aisy has emerged from stealth with $2.3 million seed funding from Osney Capital, Flying Fish Ventures, and 6 Degrees Capital together with additional angel investors. 

    The firm provides an AI-assisted platform designed to help security teams manage, prioritize, and reduce an overwhelming volume of vulnerability alert tickets. 

    “Smart people are burning out sifting through backlogs of unprioritized, low-value vulnerabilities, while the real critical pathways go unprotected,” says Shlomie Liberow, founder and CEO of Aisy (and formerly head of hacker research and development at HackerOne). 

    He doesn’t see this changing for mid-tier and larger companies – partly because of the security industry itself. Each vulnerability tool competes with other vulnerability tools, and each one avoids the possibility of a competitor finding more issues than it does itself. So, its DNA is to find everything possible irrespective of the criticality.

    Aisy operates by finding the most effectual vulnerabilities (which may not be apparent from a simple list or spreadsheet of alert tickets). It does this by looking at the system from the hacker viewpoint: from the outside first. “In the world of bug bounty,” he explains, with the authority of seven years at HackerOne, “it’s not about ‘I went onto a website, and I found a particular route, and now suddenly I’m leaking privileged information’. It’s more ‘I found this peculiar behavior, and I also saw something else odd nearby, and I can put the two together’.”

    That’s the real bug (chaining vulnerabilities), but it’s not always evident in a simple list of tickets unearthed by security products. “The play with Aisy is similar to hackers,” he continues. “We know what the patterns typically lead to. We know what things are interesting.”

    Advertisement. Scroll to continue reading.

    At a high level, this is achieved through two steps. The first is to map the system from the outside, so that Aisy understands the system in the same way that an attacker would understand it. “We map the infrastructure through the eyes of an attacker, because we believe the way the attacker makes sense of infrastructure is very different from traditional security tooling.” This is done daily to accommodate all changes as they happen, and to continuously ensure the platform understands what an attacker would understand.

    The second step is to ingest all the existing tickets, whether produced by security tooling, pen testing, or even bounty hunters. “We then sieve through these from the viewpoint of a hacker and can see where separate tickets could combine into something more severe. You might have an IDOR [insecure direct object reference, now more usually classified as broken access control] and a separate XSS.”

    The platform might find six or more tickets that could be chained together. But it also understands the assets that could be affected by this chaining, and how important the different assets might be to the company. In this way it can surface the most important vulnerability tickets that should be remediated first to protect the infrastructure.

    It uses AI to add ‘creativity’ to its analysis, but Liberow is well aware of the limitations and issues with LLMs. “It helps with semantic understanding of different tickets from different sources, but doesn’t assist in relating tickets to tickets and to assets. That’s down to our own platform.”

    Aisy doesn’t currently do any autonomous remediation of the vulnerabilities it highlights as urgent. Liberow is not sure that industry is ready to allow autonomous remediation yet. “I think we can get close. We can give advice, and that’s part of what we’re doing. But we’re not focused on automated remediation for two reasons, partially because I don’t want to get distracted while we’re focusing on the more hairy problems; and partially because the industry isn’t ready to accept the idea of pressing a button to fix everything without panicking.”

    In general, companies are competent in fixing their own problems, but Aisy surfaces the why and how and in what order remediating vulnerabilities found within potentially hundreds of thousands of alert tickets should be undertaken.

    Related: Cyber Insights 2026: Threat Hunting in an Age of Automation and AI

    Related: AI Emerges as the Hope—and Risk—for Overloaded SOCs

    Related: APTs, Cybercriminals Widely Exploiting WinRAR Vulnerability

    Related: Furl Raises $10 Million for Autonomous Vulnerability Remediation

    Aisy launches Management Stealth Transform vulnerability
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle Explores AI Opt-Outs, Gemini 3 Powers AIOs
    Next Article I found the perfect writing app by going back in time
    admin
    • Website

    Related Posts

    Researchers Uncover Method to Track Cars via Tire Sensors

    March 3, 2026

    SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

    March 3, 2026

    AI went from assistant to autonomous actor and security never caught up

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Researchers Uncover Method to Track Cars via Tire Sensors

    March 3, 2026

    How to revise your old content for AI search optimization

    March 3, 2026

    Best High-Yield Checking Accounts for March 2026

    March 3, 2026

    This amazing ESP32 projector integrates with Home Assistant and displays whatever you want

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (573)
    • Privacy & Online Earning (80)
    • SEO & Digital Marketing (358)
    • Tech Tools & Mobile / Apps (709)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Researchers Uncover Method to Track Cars via Tire Sensors

    March 3, 2026

    How to revise your old content for AI search optimization

    March 3, 2026

    Best High-Yield Checking Accounts for March 2026

    March 3, 2026
    Most Popular
    • Researchers Uncover Method to Track Cars via Tire Sensors
    • How to revise your old content for AI search optimization
    • Best High-Yield Checking Accounts for March 2026
    • This amazing ESP32 projector integrates with Home Assistant and displays whatever you want
    • SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More
    • Google Clarifies How It Picks Thumbnails For Search, Discover
    • These budget-friendly wireless earbuds deliver a pleasant experience while still being easy on the wallet
    • AI went from assistant to autonomous actor and security never caught up
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.