Experts Advise What NOT to do in your Cloud Security and Compliance Program in 2022
Orca Security asked CEOs, CISOs, and other cyber security leaders across a variety of industries for their advice on how...
Orca Security asked CEOs, CISOs, and other cyber security leaders across a variety of industries for their advice on how...
In the third part of the Orca Security blog post series about Azure AD and IAM, Roee shares research on...
Update as of December 28, 2021: A new remote code execution (RCE) flaw has been discovered in Log4j 2.17.0, tracked...
Orca Security roundup of Cybersecurity Leaders and Experts: Where should organizations focus their cloud compliance strategies in 2022?
Have you and your security team been working weekends and long days to remediate Log4j2 vulnerabilities? With new Log4j vulnerabilities...
Table of contentsWhat are managed identities?Getting a managed identity access tokenThe known privilege escalation methodMy research objectivesEscalation to managed identities’...
Logs can be used to check for anomalies and give insight into suspected breaches. Flow logs on network watcher {AzureNetworkFlowLog}...
Orca Security presented "Invisible Security at the Speed of Cloud" at AWS Re:Invent 2021. Here’s a recap of what we...
Google’s approach to Identity and Access Management is relatively the most straightforward among the three major cloud providers.