Azure Machine Learning Escalation: When Pipelines Go Off the Rails
Table of contentsExecutive summaryA quick introduction to Azure Machine LearningHow AML pipelines are commonly usedHow the privilege escalation vulnerability could...
Table of contentsExecutive summaryA quick introduction to Azure Machine LearningHow AML pipelines are commonly usedHow the privilege escalation vulnerability could...
When we first announced the Orca MCP Server, we showed some examples with Claude and with Cursor. In this blog,...
Today, we’re excited to release the 2025 State of Cloud Security Report, which reveals deep insights uncovered by the Orca...
In-Depth Research 2025 State of Cloud Security Report Hunting threats in the age of relentless risk Get the Report Billions...
In late April 2025, SAP disclosed CVE-2025-31324, a critical vulnerability in SAP NetWeaver’s Visual Composer development server. The flaw—stemming from...
Over the last year, we've witnessed a pivotal shift in how large language models (LLMs) are used - not just...
Executive Summary: The Orca Research Pod has discovered CVE-2025-48710 in kro (Kube Resource Orchestrator) where an attacker could introduce a malicious CustomResourceDefinition...
Yesterday, MITRE executives announced that the MITRE CVE database may go dark due to a funding gap starting from today,...
Generative AI is fundamentally changing how we work, expanding human creativity and optimizing productivity across the search-summarize-synthesize workflow we use...