Integrating Aqua Security with the Orca Cloud Security Platform
Today, Aqua Security and Orca Security are proud to announce the availability of an integration between the Aqua Platform and...
Today, Aqua Security and Orca Security are proud to announce the availability of an integration between the Aqua Platform and...
The RSA Conference is the premier event for the cybersecurity community, bringing together experts, professionals, and enthusiasts from around the...
In our journey through the landscapes of human and organizational thought, we've observed the OODA loop in action, revealing the...
Table of contentsExecutive Summary:What are Azure, Gcloud and AWS CLI?Exposure of Serverless environment variablesAWS CLI LeakageGcloud CLI LeakageExploitation Proof of...
We’re pleased to announce that Orca Security has been accepted into Google Cloud’s Generative AI Partner Initiative, following the integration...
Table of contentsBuilding the vulnerable scenariosScenario 1: Web application vulnerabilityScenario 2: CI/CD server vulnerabilityAutomated vulnerability detection using Nuclei templatesScenario 1:...
At Orca Security, we’re proud to engage with customers, partners, and the cybersecurity community to make the cloud a safer,...
A malicious backdoor has been discovered in the XZ Utils package, a popular data compression library used in major Linux...
With 84% of vulnerable and exposed TeamCity servers likely already compromised, the recent issue in JetBrains’ TeamCity illustrates how a...