Kubernetes Testing Environment: An Open Source Resilience Platform for EKS, GKE and AKS
It will come as no surprise that Kubernetes deployments are growing exponentially across many industries. According to the Cloud Native...
It will come as no surprise that Kubernetes deployments are growing exponentially across many industries. According to the Cloud Native...
Microsoft recently advised of a critical TCP/IP Remote Code Execution Vulnerability dubbed CVE 2024-38063, which is a critical unauthenticated Remote...
Table of contentsExecutive Summary:What are Azure, Gcloud and AWS CLI?Exposure of Serverless environment variablesAWS CLI LeakageGcloud CLI LeakageExploitation Proof of...
On January 31st, Snyk unveiled the discovery of four novel container vulnerabilities that target the runC and BuildKit components within...
The Orca Research Pod has uncovered a dangerous loophole in Google Kubernetes Engine (GKE) that could allow an attacker with...
The Orca Research Pod has made an important discovery that puts Google Cloud Dataproc clusters at risk for data theft,...
Bad.Build is a critical design flaw discovered by the Orca Research Pod in the Google Cloud Build service that enables...
Here at Orca Security, our team of cloud researchers are continually pushing the cloud security limits to ensure that we...
Elastic IPs (EIPs) are public and static IPv4 addresses provided by AWS. EIPs can be viewed as a pool of...