Meet the Team ( ) {

Power and dedication will make the impossible possible;


Chaim Peer
Co-Founder CEO
Guy Levinger
Co-Founder CTO
Omer Elbaz
Co-Founder CDO
Roy Barnea
Chief Architect

Our Process

BLST focuses on business logic attacks to provide more information, higher impact, and perfect working comfort.

In contrast to common attacks, such as SQLI and XSS, each logic attack is usually unique, since it has to exploit a function or a feature that is specific to each application.

Here's an example of a logic attack:

While this example seems pretty simple and easy to enforce, many developers forget to implement sanity-checks like these in many places. This is just a simple example, but there are much more complicated logic attacks out there.

To summarize, logic attacks are very common and are unique to each application and feature and are also very dangerous. Those properties make them very hard to discover using automated tools but also very important to fix.

How we’re different

identifying logic attacks

BLST’s application-centric algorithms identify patterns and logic attacks in real time, helping service providers adjust their operations and react quickly to changing demand.

Self learning

Our agnostic algorithm is unique in terms of learning the traffic. Our Artificial Penetration Tester product simulates attacks on the application and then learns the results, therefore enabling it to work with any kind of web application.

Unique blend

We combine a number of different methodology products into one, saving the company time and effort.