Building Application Security from the Ground Up: An Organizational Approach
This blog post complements our guide on What is Application Security? by diving deep into the organizational foundations required to...
This blog post complements our guide on What is Application Security? by diving deep into the organizational foundations required to...
Forrester has named Orca as a Strong Performer in The Forrester Wave™: Cloud Native Application Protection Solutions, Q1 2026. In...
Introduction A critical vulnerability (CVE-2026-1731, CVSS 9.9) was publicly disclosed on February 6, 2026 affecting BeyondTrust Remote Support (RS) and...
We forced GitHub to prompt-inject itself. It allowed us to control Copilot’s responses and exfiltrate Codespaces’ GITHUB_TOKEN secret. The end...
The AI Era Is a Scale Problem — And CISOs Can’t Solve It the Old Way Every major technology shift...
Introduction A critical vulnerability (CVE-2025-62878, CVSS 10.0) was disclosed on February 4, 2026 affecting all versions of Rancher's Local Path...
In Part 1, we explored how the Orca MCP (Model Context Protocol) Server bridges the gap between AI and your...
Executive Summary The Orca Research Pod has uncovered multiple attack vectors in GitHub Codespaces that allow remote code execution (RCE)...
Today, we’re excited to announce that Orca can be integrated with Tencent Cloud. This makes Orca the first third-party Cloud...