Two XSS Vulnerabilities in Azure with Embedded postMessage IFrames
Microsoft Azure offers a diverse range of services that empower organizations with convenient and scalable cloud infrastructure solutions. However, even...
Microsoft Azure offers a diverse range of services that empower organizations with convenient and scalable cloud infrastructure solutions. However, even...
This post was originally published to The New Stack. In 2017, a major American credit bureau suffered one of the...
In June 2022, the Cybersecurity and Infrastructure Security Agency (CISA) released the Cloud Security Reference Architecture with co-authors United States...
Life at Orca Security revolves around the Pod - the people who have joined Orca’s mission to make the cloud...
This post was originally published on The New Stack. Gartner predicted a 20.4% increase in worldwide spending on public cloud...
Ensuring robust cloud security is a top priority for organizations navigating the ever-evolving digital landscape. We proudly announce that Orca...
Kafka cluster {AwsKafkaCluster} is using Kafka version 2.4.1. This version contains bugs and is not supported by AWS MSK
You should verify that all the registry certificate files (usually found under /etc/docker/certs.d/ directory) have permissions of 444 or are...
You should verify that the TLS CA certificate file (the file that is passed along with the -- tlscacert parameter)...