How AI-Powered Cloud Security is Helping Solve Five Industry Problems
In cloud security, speed is of the essence. Organizations need speed to stay ahead of the attackers who are constantly...
In cloud security, speed is of the essence. Organizations need speed to stay ahead of the attackers who are constantly...
At Orca Security, we’re on a mission to make it fast, easy, and cost effective for organizations to address the...
On January 31st, Snyk unveiled the discovery of four novel container vulnerabilities that target the runC and BuildKit components within...
Orca has discovered three new vulnerabilities within various Azure HDInsight third-party services, including Apache Hadoop, Spark, and Kafka. These services...
On January 24th, Jenkins, a widely used open source CI/CD automation tool, released a security advisory regarding a new critical...
Publicly disclosed computer vulnerabilities are compiled into a list called Common Vulnerabilities and Exposures (CVE). To understand the severity of...
Last week, Microsoft revealed that the Russia-based threat actor group known as Midnight Blizzard, Cozy Bear, and APT29 had compromised...
The Orca Research Pod has uncovered a dangerous loophole in Google Kubernetes Engine (GKE) that could allow an attacker with...
Following our discovery of a critical loophole in Google Kubernetes Engine (GKE) dubbed Sys:All, we decided to conduct research into...