Dependency Confusion Supply Chain Attacks: 49% of Organizations Are Vulnerable
In recent years, supply chain attacks targeting software developers and suppliers have become increasingly common. The primary objective of these...
In recent years, supply chain attacks targeting software developers and suppliers have become increasingly common. The primary objective of these...
Today, at BlueHat IL 2023, we proudly announced our discovery of a new vulnerability in Azure, which we've dubbed 'Super...
As part of the Orca Research Pod efforts, we regularly research various cloud provider services and capabilities to help our...
In this blog we describe how we uncovered an SSRF Vulnerability in the Azure DigitalTwins Explorer service, allowing any unauthenticated...
In this blog we describe how we uncovered an SSRF Vulnerability in Azure Functions allowing any unauthenticated user to request...
In this blog we describe how we uncovered an important Server-Side Request Forgery (SSRF) Vulnerability on Azure API Management Service,...
In this blog we describe how we uncovered an SSRF Vulnerability in the Azure Machine Learning service, allowing any authenticated...
The Orca Research Pod has discovered CosMiss, a vulnerability in Microsoft Azure Cosmos DB where authentication checks were missing from...
The Orca Research Pod has discovered FabriXss, a vulnerability in Azure Service Fabric Explorer