What is Application Security?
The development of cloud-native applications is fueling business innovation, but also expanding the attack surface. According to the Verizon Data...
The development of cloud-native applications is fueling business innovation, but also expanding the attack surface. According to the Verizon Data...
TL;DR This is the second time a malicious campaign - codenamed Shai‑Hulud - has been detected targeting the npm ecosystem....
AI adoption is accelerating at an incredible clip. The 2024 State of AI report found that 56% of organizations have...
The OWASP Top 10 2025 release candidate is here, marking an important milestone in the evolution of application security best...
In Part 1 of this blog series, we learned about GitHub Actions and their risks—now comes the fun part. It’s...
Why do attackers love GitHub Actions, and why should you care? The answer lies in a dangerous combination of widespread...
This week, three new high-severity vulnerabilities were revealed in runC, the fundamental runtime technology used by most container platforms. This...
As artificial intelligence becomes foundational to modern business and software development, organizations are discovering a new dimension of risk. AI...
At Orca Security, we’re proud to engage with customers, partners, and the cybersecurity community to make the cloud a safer,...