The Five Most Common AI Model Risks and How to Prevent Them
It’s hard to ignore how GenAI has already become an integral part of our daily lives, with people using LLMs...
It’s hard to ignore how GenAI has already become an integral part of our daily lives, with people using LLMs...
A malicious backdoor has been discovered in the XZ Utils package, a popular data compression library used in major Linux...
On January 24th, Jenkins, a widely used open source CI/CD automation tool, released a security advisory regarding a new critical...
Publicly disclosed computer vulnerabilities are compiled into a list called Common Vulnerabilities and Exposures (CVE). To understand the severity of...
Last week, Microsoft revealed that the Russia-based threat actor group known as Midnight Blizzard, Cozy Bear, and APT29 had compromised...
It’s hard to believe that 2023 is nearing its end. As we look ahead to 2024, the Orca Research Pod...
The highly anticipated Common Vulnerability Scoring System (CVSS) version 4 is planned to be released on October 31st by the...
The state of cloud security is a dynamic and ever-evolving landscape, as both attackers and defenders continuously adapt their tactics...
As we approach the middle of 2023, we thought it an appropriate time to reflect on the cloud security risks...