POC and Explanation of Critical TeamCity Authentication Bypass Vulnerability (CVE-2024-27198)
With 84% of vulnerable and exposed TeamCity servers likely already compromised, the recent issue in JetBrains’ TeamCity illustrates how a...
With 84% of vulnerable and exposed TeamCity servers likely already compromised, the recent issue in JetBrains’ TeamCity illustrates how a...
The National Vulnerability Database (NVD), a US government repository of standards-based vulnerability data that enables organizations and cybersecurity solutions to...
Table of contentsContainer security across the SDLCSDLC Stage 1: Build stage security best practicesSDLC Stage 2: Deployment challenges and best...
Recently, the US National Security Agency (NSA) joined United Kingdom’s National Cyber Security Center (NCSC) in releasing an advisory detailing...
The power of integrating security scanning and policy enforcement earlier in the application development lifecycle is tremendous. Orca’s GitHub App...
At Orca Security, we’re on a mission to make it fast, easy, and cost effective for organizations to address the...
Last week, Microsoft revealed that the Russia-based threat actor group known as Midnight Blizzard, Cozy Bear, and APT29 had compromised...
Eric Goldstein, the executive assistant director for cybersecurity at the US government’s Cybersecurity and Infrastructure Security Agency (CISA), recently said...
The recent decision by the US Securities & Exchange Commission to require companies to report on cybersecurity risk and “material”...