Google Cloud Storage Explorer: Enumerating Google Cloud’s Bucket Access Permissions
The ‘Google Cloud Platform Storage Explorer’ tool crawls all of your Google Cloud projects and detects which have access to...
The ‘Google Cloud Platform Storage Explorer’ tool crawls all of your Google Cloud projects and detects which have access to...
The 2022 Cloud Security Alert Fatigue Report discusses the scale of the cybersecurity alert fatigue problem, its causes and impacts,...
The Orca Security Research Pod has been actively tracking cyber attacks leading up to and occurring as part of Russia’s...
A new critical Linux privilege escalation vulnerability was published under the ID CVE-2022-0847, named “Dirty Pipe.”
This newest widget is called “From the News” and consists of a news feed of articles in a scrolling format.
AutoWarp is a critical vulnerability in Microsoft Azure Automation Service that allows unauthorized access to other customer accounts using the...
How a malicious actor can conduct lateral movement in Google Cloud across compute engine instances using the default service account.
The Orca Security Score enables you to assess and monitor your cloud security posture.
CIEM Mantra: 1) identity hygiene, 2) detecting deviation from best practices, and 3) using identity data to understand/prioritize risks in...