• English
  • Search
  • Contact
  • Login
    • USA
    • Europe
    • Australia
    • US-Gov
  • The Orca Platform

    Secure cloud infrastructure, workloads, data, APIs, and identities with our industry-leading agentless platform.

    • Platform Overview
    • Cloud Security Posture Management
      Identify and remediate misconfigurations across clouds
    • Cloud Workload Protection
      Protect VMs, containers, and serverless functions
    • Container and Kubernetes Security
      Scalable security for containers and Kubernetes for every cloud layer
    • Cloud Detection & Response
      24x7 monitoring and response across the entire cloud attack surface
    • Vulnerability Management
      Agentless vulnerability management that prioritizes your most critical risks
    • Cloud Infrastructure Entitlement Management
      Secure cloud identities and entitlements
    • Multi-Cloud Compliance
      Achieve regulatory compliance with frameworks, benchmarks, and custom checks
    • Shift Left Security
      Secure cloud-native apps across the SDLC
    • SideScanning™ Technology
      Our innovative approach provides complete cloud coverage
    • API Security
      Complete API discovery, security posture management, and drift detection
    • Data Security and Posture Management
      Reduce the risk of data breaches and protect sensitive PII
  • Case Studies

    Orca Security is trusted by the most innovative companies across the globe.

    • Browse Case Studies

    Industries

    • Financial Services
    • Technology
    • Government
    • Retail
    • Healthcare
    • Media & Entertainment

    User Roles

    • CISO
    • Security Architect
    • DevOps

    Orca Powers Cloud Security for Digital Turbine.

    Read Case Study

    Insurance Innovator Lemonade Goes from 0 to 100% Cloud Visibility with Orca Security.

    Read Case Study

  • Our Partners

    Our team is extended and strengthened by our strong partnerships across the Cloud Security ecosystem.

    • Partner Overview
    • Join the Program
    • Amazon Web Services
    • Microsoft Azure
    • Google Cloud
    • Alibaba Cloud
    • Oracle Cloud
  • Orca Research Pod

    Our expert security research team discovers and analyzes cloud risks and vulnerabilities to strengthen the Orca platform.

    • See Our Latest Discoveries

    Orca Research

    How Orca Found SSRF Vulnerabilities in Four Different Azure Services

    CosMiss: Azure Cosmos DB Notebook Remote Code Execution Vulnerability

    Cloud Risk Encyclopedia - Browse Thousands of Cloud Risks

  • Resource Library

    Download and view eBooks, whitepapers, videos and more in our packed Resource Library.

    • Browse Resources

    Blog

    Read Cloud Security thought leadership, how-to's, and insightful posts from Orca Security experts.

    • Browse Blogs
    • Cloud Risk Encyclopedia
    • Product Articles & Videos
    • Comparisons
    • Events & Webinars
    • Podcasts
    • Customer Support
  • Our Customers

    Orca Security is trusted by the most innovative companies across the globe.

    • Browse Case Studies
    • Why Orca
    • About Us
    • Newsroom
    • Ratings & Reviews
    • Media & Press
    • Careers
    • FAQs
    • Contact Us
  • English
  • Search
  • Contact
  • Login
    • USA
    • Europe
    • Australia
    • US-Gov
  • Free Trial
  • Get Demo
View more results

All articles by Liat Vaknin

The ‘Google Cloud Platform Storage Explorer’ tool crawls all of your Google Cloud projects and detects which have access to all storage data.

Blog

Google Cloud Storage Explorer: Enumerating Google Cloud’s Bucket Access Permissions

Liat Vaknin

Liat Vaknin Mar 17, 2022

Blog

Lateral Movement in Google Cloud: Abusing the Infamous Default Service Account Misconfiguration

Liat Vaknin

Liat Vaknin Mar 04, 2022

Blog

HTTP Protocol Stack Remote Code Execution Vulnerability

Liat Vaknin

Liat Vaknin Jan 17, 2022

See Orca in action See Orca in action-> View a 10 minute recorded demo or sign up for a personalized one-on-one walk-through.
  • Platform

    • CLOUD SECURITY PLATFORM

      • Platform
      • SideScanning™ Technology
      • Context-Aware Security
      • Built-in Compliance
      • Automation & Customization
    • TECHNOLOGY ECOSYSTEM

      • Amazon Web Services
      • Microsoft Azure
      • Google Cloud Platform
  • Solutions

    • By Solution

      • Malware Detection
      • Vulnerability Management
      • Sensitive Data Detection
      • Container and Kubernetes Security
      • Multi-Cloud Compliance and Security
      • Cloud Security Posture Management (CSPM)
      • CIEM
      • Cloud Workload Protection Platform (CWPP)
      • Cloud Detection and Response (CDR)
      • Shift Left Security
      • API Security
      • Data Security and Posture Management (DSPM)
    • By Industry

      • Financial Services
      • Technology Services
      • Media & Entertainment
      • Healthcare
      • Retail
  • Resources

      • Library
      • Product Info
      • Podcast
      • Case Studies
      • Cloud Risk Encyclopedia
      • Blog
      • Events
    • COMPARISONS

      • Prisma Cloud Security 2022
      • Qualys Cloud Agent
      • Twistlock Container Security
      • Redlock Palo Alto
      • Rapid7 InsightVM
      • Check Point CloudGuard Dome9
  • Company

      • About
      • Partners
      • Reviews
      • Orca Research Pod
      • Careers
      • Newsroom
      • Media Kit
      • FAQs
    • Contact
      • Support
      • Login
  • Stay in touch

    Get cloud security insights
    and the latest Orca news


Orca Security

©2023 Orca Security. All rights reserved.

  • Privacy Policy
  • Terms of Use