How to Detect and Mitigate CVE-2024-6387: a Critical RCE Vulnerability in OpenSSH
A critical Remote Unauthenticated Code Execution (RCE) vulnerability has been discovered in OpenSSH server (sshd) on glibc-based Linux systems (Ubuntu,...
A critical Remote Unauthenticated Code Execution (RCE) vulnerability has been discovered in OpenSSH server (sshd) on glibc-based Linux systems (Ubuntu,...
Table of contentsIntroduction to Container SecurityContainer Security Key ThreatsBest Practices for Container SecurityContainer Security Tools and SolutionsStrengthen your container security...
On June 30th, 2024, CentOS 7 reaches its end-of-life (EOL) date. After this date, the platform will no longer receive...
Ticketing systems are, in many ways, the engine that drives DevOps and many other facets of modern IT. To be...
GitHub and GitLab – two of the most popular source code management (SCM) platforms – are a modern marvel for...
On this International Women in Engineering Day, Orca Security is proud to recognize the outstanding achievements and contributions of women...
This Pride Month, we're honored to spotlight DeMarcus Gilliard, Senior Account Executive at Orca Security based in LA, and his...
On June 6th, researchers from Shadowserver, a nonprofit security organization, discovered a heavily exploited vulnerability in PHP servers running on...
For those of you that don’t know me, I am Chief Information Security Officer (CISO) at Orca Security. I’m responsible...