pull_request_nightmare Part 2: Exploiting GitHub Actions for RCE and Supply Chain
Executive summary We have managed to successfully compromise repositories owned by Microsoft, Google, Nvidia and many more using a single...
Executive summary We have managed to successfully compromise repositories owned by Microsoft, Google, Nvidia and many more using a single...
Source code has become one of the most valuable and vulnerable assets organizations possess. As development teams increasingly rely on...
Executive Summary: The Orca Research Pod has uncovered critical security risks across several high-profile open source repositories that relied on...
We’re proud to share that Orca Security has been recognized as a Leader in the 2025 GigaOm Radar Report for...
TL;DR A new software supply chain attack has been identified, targeting the npm registry and this time impacting more than...
When it comes to hybrid cloud security, one of the biggest blind spots remains Windows-based workloads. Despite their central role...
Reports have emerged of a major supply chain attack impacting numerous NPM packages maintained by the developer known as “qix.”...
According to the 2025 State of Cloud Security Report, 85% of organizations have plaintext secrets embedded in their source code...
On August 26, 2025, the open-source ecosystem was shaken by a new supply chain attack that targeted Nx, a popular...