Request a demo
  • Product
  • Customers
  • Research
  • Resources
    • Blog
    • Learning Center
    • Contact
  • Company
    • About Us
    • Press
    • Careers
  • Login
Login Request a demo
Wiz debuts on Forbes Cloud 100 list

Wiz debuts on Forbes Cloud 100 list

Founded in 2020, Wiz is the youngest company on the list

  • Wiz
Wiz Aug 9, 2022 • 1 min read
Join Wiz at Black Hat 2022

Join Wiz at Black Hat 2022

Wiz is excited to be back in Las Vegas for Black Hat 2022 as a sponsor of this year's conference. At Black Hat, you'll have the opportunity to learn from our research and product experts, experience live demos in our booth, and mingle with us after the conference. Visit our

  • Josh Dreyfuss
Josh Dreyfuss Aug 8, 2022 • 2 min read
Making security a business asset: How Atlan builds customer confidence with Wiz

Making security a business asset: How Atlan builds customer confidence with Wiz

Atlan, the active metadata platform, looked for a single, unified platform to see its multi-cloud enviornment and prevent toxic combinations of risk.

  • Ana Kutcher
Ana Kutcher Aug 5, 2022 • 4 min read
Copper Technologies gains friction-free cloud security for its digital asset investment platform

Copper Technologies gains friction-free cloud security for its digital asset investment platform

Copper, the rapidly growing cryptocurrency company aims to be at the forefront of fintech cybersecurity. Wiz helps the team identify and prioritize critical risks while reducing noisy alerts.

Morgan Ebbing Aug 5, 2022 • 4 min read
Auto-patching for Azure OMI dependent agents: How Wiz Research worked with Azure to make the cloud safer

Auto-patching for Azure OMI dependent agents: How Wiz Research worked with Azure to make the cloud safer

In the past year, Wiz Research has shed light on cloud middleware, software that brokers between customer workloads and cloud providers’ managed services. The task of updating middleware software is not well defined by the cloud shared responsibility model and customers are often unaware of its existence and the attack

  • Alon Schindel
Alon Schindel Aug 4, 2022 • 5 min read
Revisiting OMI: Analysis of CVE-2022-29149, a privilege escalation vulnerability in Azure OMI

Revisiting OMI: Analysis of CVE-2022-29149, a privilege escalation vulnerability in Azure OMI

Affected organizations are required to update installed agents that use the OMI cloud middleware software In the last year, we invested time and effort researching cloud middleware, the software that bridges between customers' virtual machines and cloud providers’ managed services. As part of June 2022 Patch Tuesday, Microsoft published a

  • Nir Ohfeld
  • Rotem Lipowitch
Nir Ohfeld, Rotem Lipowitch Aug 4, 2022 • 7 min read
Lili achieves PCI DSS compliance using the visibility provided by Wiz

Lili achieves PCI DSS compliance using the visibility provided by Wiz

Lili is an all-in-one banking app designed for anyone who runs a business on their own, whether they operate as sole proprietors (with or without DBA) or Single-Member LLC. By combining a business checking account with technology to save on taxes and built-in tools to streamline their accounting, Lili helps

  • Benjamin Miller
Benjamin Miller Aug 1, 2022 • 2 min read
See the best of Wiz at AWS re:Inforce

See the best of Wiz at AWS re:Inforce

Visit our booth or attend one of our many sessions at re:Inforce this week.

  • Jordan Fylonenko
Jordan Fylonenko Jul 26, 2022 • 1 min read
Wiz CDR and Amazon GuardDuty: Contextualize and prioritize threat detection

Wiz CDR and Amazon GuardDuty: Contextualize and prioritize threat detection

Wiz leverages its leading Cloud Security Graph to help Cloud Defenders quickly understand, with the click of a button— what happened, where it happened, and how to respond.

  • George Pisha
George Pisha Jul 26, 2022 • 1 min read
Meet the Wiz Research team at fwd:cloudsec

Meet the Wiz Research team at fwd:cloudsec

We invite you to attend Wiz Research's four technical sessions as well as the Wiz party at Flight Club Boston.

  • Jordan Fylonenko
Jordan Fylonenko Jul 25, 2022 • 2 min read
Wiz extends CNAPP leadership with protection for Alibaba Cloud

Wiz extends CNAPP leadership with protection for Alibaba Cloud

Support for Alibaba Cloud follows just weeks after launch of Oracle Cloud Infrastructure (OCI) integration, providing organizations the broadest coverage of any cloud native application protection platform (CNAPP)

  • Oron Noah
Oron Noah Jun 29, 2022 • 2 min read
The cloud gray zone—secret agents installed by cloud service providers

The cloud gray zone—secret agents installed by cloud service providers

Wiz Research builds upon previous “OMIGOD” findings with a presentation at RSA Conference 2022; details how cloud middleware use across cloud service providers can expose customers' virtual machines to new attack vectors

  • Nir Ohfeld
  • Shir Tamari
Nir Ohfeld, Shir Tamari Jun 8, 2022 • 2 min read
A new vision for cloud security unites builders and defenders

A new vision for cloud security unites builders and defenders

Our introduction of attack path analysis (APA) and Cloud Detection and Response (CDR) further enriches the context provided by our foundational Wiz Security Graph.

  • Yinon Costica
Yinon Costica Jun 6, 2022 • 5 min read
Wiz launches cloud detection and response to help organizations quickly identify threats and limit breach exposure

Wiz launches cloud detection and response to help organizations quickly identify threats and limit breach exposure

Wiz Cloud Detection and Response (CDR) enables cloud security teams to detect and respond with context and real time cloud events to quickly identify threats as they unfoldWiz also introduces Wiz Advanced Control, identifying critical risks before they become threats with the first automated, cross-cloud, cross-account attack path analysis (APA)

  • Wiz
Wiz Jun 6, 2022 • 5 min read
Wiz now integrates with Oracle Cloud Infrastructure, bringing a graph-based cloud security approach to all major providers

Wiz now integrates with Oracle Cloud Infrastructure, bringing a graph-based cloud security approach to all major providers

Fortune 500’s Avery Dennison among enterprises that operate securely on OCI and other cloud infrastructure with Wiz

  • Yinon Costica
Yinon Costica Jun 2, 2022 • 2 min read
Connect with Wiz at our first-ever RSA Conference

Connect with Wiz at our first-ever RSA Conference

We can’t wait to see many of you at RSA Conference 2022 in San Francisco, June 6-9. Check out a demo at our booth, attend a Wiz speaking session, or unwind at our SFMOMA party!

  • Jordan Fylonenko
Jordan Fylonenko May 24, 2022 • 3 min read
How Agoda secures its subsidiaries and migration to the cloud

How Agoda secures its subsidiaries and migration to the cloud

From securing cloud-native subsidiaries to covering its hybrid cloud deployment and growing cloud migration, Agoda relies on Wiz across the board. Read more.

  • Ana Kutcher
Ana Kutcher May 11, 2022 • 3 min read
Securing AWS Lambda function URLs

Securing AWS Lambda function URLs

Learn about the security risks of misconfigured Lambda function URLs and how to properly secure them

  • Amitai Cohen
  • Alon Schindel
Amitai Cohen, Alon Schindel May 9, 2022 • 8 min read
Wiz Research discovers "ExtraReplica"— a cross-account database	vulnerability in Azure PostgreSQL

Wiz Research discovers "ExtraReplica"— a cross-account database vulnerability in Azure PostgreSQL

Tenant isolation is a fundamental premise of the cloud. Organizations trust that the cloud services they use, especially high value assets such as databases, are isolated from other customers. Wiz Research has discovered a chain of critical vulnerabilities in the widely used Azure Database for PostgreSQL Flexible Server. Dubbed #ExtraReplica,

  • Sagi Tzadik
  • Nir Ohfeld
  • Shir Tamari
  • Ronen Shustin
Multiple authors Apr 28, 2022 • 14 min read
Fox democratizes security with Wiz

Fox democratizes security with Wiz

When you’re in the business of delivering live news, sports, and entertainment you need to be ready for anything. That’s why, as one of the largest media companies in the world, FOX couples its mission to produce and deliver iconic television content to fans with the right team

  • Josh Dreyfuss
Josh Dreyfuss Apr 18, 2022 • 5 min read
Addressing the Spring4Shell and CVE-2022-22963 RCE vulnerabilities in cloud environments

Addressing the Spring4Shell and CVE-2022-22963 RCE vulnerabilities in cloud environments

Learn how to address Spring4Shell and CVE-2022-22963 RCE vulnerabilities in cloud environments

  • Amitai Cohen
Amitai Cohen Mar 31, 2022 • 5 min read
Hardening your cloud environment against LAPSUS$-like threat actors

Hardening your cloud environment against LAPSUS$-like threat actors

Learn how to harden your cloud environment against LAPSUS$-like threat actors

  • Amitai Cohen
Amitai Cohen Mar 25, 2022 • 6 min read
Wiz and ServiceNow VR: Prioritize and respond to cloud vulnerabilities faster

Wiz and ServiceNow VR: Prioritize and respond to cloud vulnerabilities faster

Wiz is excited to announce its new integration with ServiceNow Vulnerability Response (VR), creating a combined vulnerability management workflow that eliminates blind spots and prioritizes risks.

  • Itay Arbel
Itay Arbel Mar 1, 2022 • 2 min read
How Mars affected a sea change in their cloud security

How Mars affected a sea change in their cloud security

Over 8-12 months with Wiz, Mars was able to affect a sea change in their security posture. They got a full asset inventory of their cloud environment for the first time and were able to make measurable improvements to their security posture across the board. Read more.

  • Josh Dreyfuss
Josh Dreyfuss Mar 1, 2022 • 3 min read
Detect and prioritize CISA Known Exploited Vulnerabilities in the cloud with Wiz

Detect and prioritize CISA Known Exploited Vulnerabilities in the cloud with Wiz

For each CVE, the Wiz Research team maintains data from multiple threat intelligence sources and our own independent research. Now that we’ve added support for the new CISA KEV catalog, learn how you can use it in your cloud environment.

  • Alon Schindel
Alon Schindel Feb 10, 2022 • 3 min read
Wiz and RegScale: Cloud security compliance management at scale

Wiz and RegScale: Cloud security compliance management at scale

Learn how to achieve compliance security at scale with Wiz and RegScale, supporting a variety of compliance framework controls.

  • Itay Arbel
Itay Arbel Feb 8, 2022 • 2 min read
5 reasons endpoint security agents are not enough

5 reasons endpoint security agents are not enough

In this post, we discuss five security limitations of endpoint security agents and also explain how adding agentless solutions can improve your cloud environment security.

  • Rotem Lipowitch
Rotem Lipowitch Feb 3, 2022 • 8 min read
The top cloud security threats to be aware of in 2022

The top cloud security threats to be aware of in 2022

As more organizations move to the cloud, so do attackers. What can you do to better protect your cloud environment in 2022? Wiz Research has compiled the most pressing cloud security threats and how you can protect against them.

  • Alon Schindel
Alon Schindel Jan 18, 2022 • 2 min read
Blackstone tackles advanced cloud-native security with Wiz

Blackstone tackles advanced cloud-native security with Wiz

As Blackstone’s Security team explored cloud security solutions, they realized that to achieve the level of risk-centric security they wanted, they needed to find a tool with a deep understanding of cloud that would help them focus on key areas, not isolated issues. And then they found Wiz.

  • Josh Dreyfuss
Josh Dreyfuss Jan 13, 2022 • 3 min read
How Yotpo gets visibility into their AWS environment and 
cloud risks

How Yotpo gets visibility into their AWS environment and cloud risks

Learn how Yotpo creates a DevSecOps culture and gets visibility into their AWS environment

  • Josh Dreyfuss
Josh Dreyfuss Jan 13, 2022 • 3 min read
Towards a better cloud vulnerability response model

Towards a better cloud vulnerability response model

Who is responsible for doing what when a new cloud vulnerability is disclosed? Right now, it can be hard to know.

  • Yinon Costica
Yinon Costica Jan 5, 2022 • 7 min read
Log4Shell: Wrap all your Log4j fixes before the holidays

Log4Shell: Wrap all your Log4j fixes before the holidays

The main challenge with Log4j is understanding your existing infrastructure, and identifying the location of all vulnerable Log4j libraries. Follow Wiz's recommendations to wrap it all before the Holidays!

  • Alon Schindel
Alon Schindel Dec 21, 2021 • 10 min read
Log4Shell impact and remediation strategy

Log4Shell impact and remediation strategy

A conversation with Igor Tsyganskiy, CTO at Bridgewater Associates and Yinon Costica, Co-founder & VP of Product at Wiz, discussing the immediate dangers and issues with Log4Shell, strategies for remediation, and its long-term impact on cybersecurity as a whole.

  • Josh Dreyfuss
Josh Dreyfuss Dec 21, 2021 • 18 min read
NotLegit: Azure App Service vulnerability exposed hundreds of source code repositories

NotLegit: Azure App Service vulnerability exposed hundreds of source code repositories

Read about the NotLegit vulnerability discovered by the Wiz Research Team, where the Azure App Service exposed hundreds of source code repositories

  • Shir Tamari
Shir Tamari Dec 21, 2021 • 6 min read
Log4Shell 10 days later: Enterprises halfway through patching

Log4Shell 10 days later: Enterprises halfway through patching

Wiz and EY (Ernest & Young) analyzed more than 200 enterprise cloud environments with thousands of cloud accounts. The results were striking: While 93% of all cloud environments are at risk from Log4Shell, on average organizations have patched 45% of their vulnerable cloud resources by Day 10.

  • Ami Luttwak
  • Alon Schindel
Ami Luttwak, Alon Schindel Dec 20, 2021 • 3 min read
Log4Shell Meltdown: How to protect your cloud from this critical RCE threat

Log4Shell Meltdown: How to protect your cloud from this critical RCE threat

Log4Shell Meltdown: How to protect your cloud from this critical RCE threat. In this post, we’ll provide a quick overview of Log4Shell: what it is, its impact, and recommendations for security teams.

  • Ami Luttwak
Ami Luttwak Dec 10, 2021 • 5 min read
Wiz magic shifts left

Wiz magic shifts left

Fixing vulnerabilities and misconfigurations in the pipeline before deployment makes perfect sense - it reduces the overall threat footprint and saves time. Wiz offers customers a straightforward way to operationalize a Shift Left strategy.

  • Jonathan Bregman
Jonathan Bregman Dec 8, 2021 • 3 min read
Assess your cloud compliance posture in minutes

Assess your cloud compliance posture in minutes

With Wiz, you can assess your compliance posture across industry standards and business units at a glance to immediately pinpoint your weak spots.

  • Mattan Shalev
Mattan Shalev Dec 1, 2021 • 2 min read
Wiz integrates with the new Amazon Inspector for enhanced security insights, context, and accuracy

Wiz integrates with the new Amazon Inspector for enhanced security insights, context, and accuracy

Wiz is excited to announce it is a launch partner for the new Amazon Inspector, bringing Amazon Inspector findings together with Wiz insights to give our customers actionable, prioritized and contextually rich security insights.

  • Adi Ravitz
Adi Ravitz Nov 29, 2021 • 1 min read
Security industry call to action: we need a cloud vulnerability database

Security industry call to action: we need a cloud vulnerability database

In the pre-cloud era, the responsibility for security was fully in the hands of the users. As we uncover new types of vulnerabilities, we discover more and more issues that do not fit the current model. Solution: we need a centralized cloud vulnerabilities database.

  • Alon Schindel
  • Shir Tamari
Alon Schindel, Shir Tamari Nov 11, 2021 • 8 min read
ChaosDB explained: Azure's Cosmos DB vulnerability walkthrough

ChaosDB explained: Azure's Cosmos DB vulnerability walkthrough

This is the full story of the Azure ChaosDB Vulnerability that was discovered and disclosed by the Wiz Research Team, where we were able to gain complete unrestricted access to the databases of several thousand Microsoft Azure customers.

  • Nir Ohfeld
  • Sagi Tzadik
Nir Ohfeld, Sagi Tzadik Nov 10, 2021 • 26 min read
How we broke the cloud with two lines of code: the full story of ChaosDB

How we broke the cloud with two lines of code: the full story of ChaosDB

A summary and recording of Wiz's talk at BlackHat Europe 2022: the full extent of ChaosDB, the impact it had, and the questions it raises about security in managed cloud services.

  • Nir Ohfeld
  • Sagi Tzadik
Nir Ohfeld, Sagi Tzadik Nov 10, 2021 • 5 min read
Celebrating Our Series C: Zero to $6 Billion in 18 Months

Celebrating Our Series C: Zero to $6 Billion in 18 Months

Customers have come to realize ignorance isn’t bliss. Cloud has gotten too big and unwieldy for most companies to effectively manage on their own. That’s where Wiz comes in.

  • Assaf Rappaport
Assaf Rappaport Oct 11, 2021 • 3 min read
Protecting cloud environments from the new critical Apache HTTP Server vulnerability

Protecting cloud environments from the new critical Apache HTTP Server vulnerability

Learn how to protect cloud environments from the new critical Apache HTTP Server vulnerability.

  • Alon Schindel
Alon Schindel Oct 7, 2021 • 5 min read
How to Protect Your Cloud Environment from Supply Chain Attacks

How to Protect Your Cloud Environment from Supply Chain Attacks

Learn how to protect your cloud environment from supply chain attacks.

  • Josh Dreyfuss
Josh Dreyfuss Oct 6, 2021 • 4 min read
Agents are not enough: Why cloud security needs agentless deep scanning

Agents are not enough: Why cloud security needs agentless deep scanning

In this post, we’re going to dive into the role and limitations of security agents in the cloud, and put forth a different approach for cloud infrastructure security: agentless deep scanning.

  • Josh Dreyfuss
Josh Dreyfuss Sep 28, 2021 • 6 min read
UPDATE: Everything you need to know about OMIGOD from the team that discovered it

UPDATE: Everything you need to know about OMIGOD from the team that discovered it

Wiz Research discovered OMIGOD and has put together a video explaining everything you need to know about it.

  • Josh Dreyfuss
Josh Dreyfuss Sep 21, 2021 • 1 min read
OMIGOD: Critical Vulnerabilities in OMI Affecting Countless Azure Customers

OMIGOD: Critical Vulnerabilities in OMI Affecting Countless Azure Customers

Wiz Research recently found 4 critical vulnerabilities in OMI, which is one of Azure's most ubiquitous yet least known software agents and is deployed on a large portion of Linux VMs in Azure.

  • Nir Ohfeld
Nir Ohfeld Sep 14, 2021 • 22 min read
“Secret” Agent Exposes Azure Customers To Unauthorized Code Execution

“Secret” Agent Exposes Azure Customers To Unauthorized Code Execution

Wiz Research recently discovered a series of alarming vulnerabilities that highlight the supply chain risk of open source code, particularly for customers of cloud computing services.

  • Nir Ohfeld
  • Alon Schindel
Nir Ohfeld, Alon Schindel Sep 14, 2021 • 8 min read
Wiz goes (even more) global

Wiz goes (even more) global

The first half of 2021 has been incredible for Wiz. Fueled by an additional $250M in funding ($350M total) from Sequoia, Index Ventures, Insight, Salesforce, Blackstone, Advent, Greenoaks, and Aglaé Wiz has grown at a blistering pace, going from 25 employees at the start of the year to 120 today.

  • Assaf Rappaport
Assaf Rappaport Sep 14, 2021 • 2 min read
Aon simplifies security and enhances visibility of its cloud environment

Aon simplifies security and enhances visibility of its cloud environment

Cloud has driven innovation and agility for organizations, but for security teams it has also brought new levels of complexity around people, processes, and technology. Today’s elastic cloud environments have introduced new risks that security must develop approaches to address. Recently, CxO hosted a webinar and security executive roundtable

  • Josh Dreyfuss
Josh Dreyfuss Sep 8, 2021 • 5 min read
ChaosDB: How to discover your vulnerable Azure Cosmos DBs and protect them

ChaosDB: How to discover your vulnerable Azure Cosmos DBs and protect them

Wiz Research found an unprecedented critical vulnerability in Azure Cosmos DB. The vulnerability gives any Azure user full admin access (read, write, delete) to another customers Cosmos DB instances without authorization.

  • Alon Schindel
Alon Schindel Aug 29, 2021 • 9 min read
ChaosDB: How we hacked thousands of Azure customers’ databases

ChaosDB: How we hacked thousands of Azure customers’ databases

As part of building a market-leading CNAPP, Wiz Research is constantly looking for new attack surfaces in the cloud. Two weeks ago we discovered an unprecedented breach that affects Azure’s flagship database service, Cosmos DB.

  • Nir Ohfeld
  • Sagi Tzadik
Nir Ohfeld, Sagi Tzadik Aug 26, 2021 • 4 min read
What is a Cloud-Native Application Protection Platform (CNAPP)?

What is a Cloud-Native Application Protection Platform (CNAPP)?

CNAPP stands for Cloud-Native Application Protection Platform. The term was coined by Gartner, who recognized the expanding needs that go into securing applications in the cloud.

  • Josh Dreyfuss
Josh Dreyfuss Aug 19, 2021 • 3 min read
Is your organization leaking sensitive Dynamic DNS data? Here’s how to find out

Is your organization leaking sensitive Dynamic DNS data? Here’s how to find out

At Black Hat on Wednesday, Wiz researchers disclosed a vulnerability in DNS hosting services that affects millions of corporate endpoints.

  • Ami Luttwak
Ami Luttwak Aug 6, 2021 • 2 min read
Black Hat 2021: How isolated is your AWS cloud environment?

Black Hat 2021: How isolated is your AWS cloud environment?

Last November, Wiz Research mapped all the services in AWS that allow access from other accounts to see if any of them might inadvertently expose customers and discovered 3 vulnerabilities in different AWS services that allowed anyone to read or write into the accounts of other AWS customers.

  • Ami Luttwak
Ami Luttwak Aug 4, 2021 • 6 min read
Black Hat 2021: DNS loophole makes nation-state level spying as easy as registering a domain

Black Hat 2021: DNS loophole makes nation-state level spying as easy as registering a domain

Wiz CTO Ami Luttwak discusses a new class of vulnerabilities discovered by Wiz Research, which exposed valuable dynamic DNS data from millions of endpoints worldwide.

  • Shir Tamari
Shir Tamari Aug 4, 2021 • 6 min read
The 10 must-attend sessions at Black Hat 2021

The 10 must-attend sessions at Black Hat 2021

The 10 must-attend sessions at Black Hat 2021

  • Benjamin Miller
Benjamin Miller Jun 24, 2021 • 10 min read
Salesforce Ventures, Blackstone, and Aglaé Join Team Wiz!

Salesforce Ventures, Blackstone, and Aglaé Join Team Wiz!

Last week Wiz closed its Series B, which we had previously announced in March, with an additional $120 million investment from Salesforce Ventures and Blackstone with participation from Aglaé Ventures.

  • Assaf Rappaport
Assaf Rappaport Jun 10, 2021 • 2 min read
New 451 Research report analyzes Wiz and the cloud security market

New 451 Research report analyzes Wiz and the cloud security market

The report breaks down the current state of the cloud security market and provides an analysis of Wiz’s product strategy, technology, competitors, and more. It’s essential reading for anyone looking for an objective third-party perspective on Wiz and the rapidly developing cloud security market.

  • Adi Ravitz
Adi Ravitz May 24, 2021 • 2 min read
UPDATE: Wiz becomes fastest growing security startup ever with new $1.7B valuation

UPDATE: Wiz becomes fastest growing security startup ever with new $1.7B valuation

Wiz becomes fastest growing security startup ever with new $1.7B valuation

  • Assaf Rappaport
Assaf Rappaport Mar 22, 2021 • 5 min read
Recent Linux sudo vulnerability affects a major percent of cloud workloads

Recent Linux sudo vulnerability affects a major percent of cloud workloads

With an estimated 90% of cloud workloads running Linux based OS, with sudo being common across distributions, many Linux cloud assets are at risk and may be affected. Versions released as far back as 2011 are affected by this vulnerability.

  • Ami Luttwak
Ami Luttwak Feb 2, 2021 • 2 min read
82% of companies unknowingly give 3rd parties access to all their cloud data

82% of companies unknowingly give 3rd parties access to all their cloud data

Cloud identity permissions are complex. So complex that innocent looking permissions provided to 3rd party vendors can lead to unintended exposure of all of your data.

  • Shir Tamari
Shir Tamari Feb 2, 2021 • 10 min read
The SolarWinds Attack

The SolarWinds Attack

SolarWinds attack explained by Wiz CTO Ami Luttwak

  • Ami Luttwak
Ami Luttwak Feb 1, 2021 • 12 min read
Wiz comes out of stealth with $100M Series A funding to reinvent cloud security

Wiz comes out of stealth with $100M Series A funding to reinvent cloud security

Today, we’re announcing a milestone in that journey: a $100M Series A funding round led by Index Ventures, Sequoia Capital, Insight Partners, and Cyberstarts.

  • Assaf Rappaport
Assaf Rappaport Dec 9, 2020 • 3 min read
Wiz © 2022