Bringing Memory to AI: A Look at A2A and MCP-like Technologies Across Platforms
Over the last year, we've witnessed a pivotal shift in how large language models (LLMs) are used - not just...
Over the last year, we've witnessed a pivotal shift in how large language models (LLMs) are used - not just...
Executive Summary: The Orca Research Pod has discovered CVE-2025-48710 in kro (Kube Resource Orchestrator) where an attacker could introduce a malicious CustomResourceDefinition...
On March 24th, 2025, Wiz’s research team published information on five vulnerabilities in the Ingress NGINX Controller for Kubernetes (ingress-nginx)...
Read about the Oracle Cloud Breach Exploiting CVE-2021-35587 and learn how to protect your organization.
Orca Security today released its inaugural State of AI Security Report, a deep dive into the security risks of deployed...
In the world of software development, automation is a huge time-saver, and GitHub Actions is one of the best tools...
It will come as no surprise that Kubernetes deployments are growing exponentially across many industries. According to the Cloud Native...
Microsoft recently advised of a critical TCP/IP Remote Code Execution Vulnerability dubbed CVE 2024-38063, which is a critical unauthenticated Remote...
We’re excited to announce that the Orca Research Pod has launched AI Goat, the first open source AI security hands-on...
On July 26th, Google sent their Google Kubernetes Engine (GKE) customers an email about the fact that they identified an...
Remediating an issue like today’s outage on Windows machines with the CrowdStrike Falcon Sensor at cloud scale can be particularly...
It’s hard to ignore how GenAI has already become an integral part of our daily lives, with people using LLMs...
On June 6th, researchers from Shadowserver, a nonprofit security organization, discovered a heavily exploited vulnerability in PHP servers running on...