Bringing Memory to AI: A Look at A2A and MCP-like Technologies Across Platforms
Over the last year, we've witnessed a pivotal shift in how large language models (LLMs) are used - not just...
Over the last year, we've witnessed a pivotal shift in how large language models (LLMs) are used - not just...
Executive Summary: The Orca Research Pod has discovered CVE-2025-48710 in kro (Kube Resource Orchestrator) where an attacker could introduce a malicious CustomResourceDefinition...
On March 24th, 2025, Wiz’s research team published information on five vulnerabilities in the Ingress NGINX Controller for Kubernetes (ingress-nginx)...
Read about the Oracle Cloud Breach Exploiting CVE-2021-35587 and learn how to protect your organization.
Fun Facts About Lidor Beverage of choice: Coffee or soda Go-to snack: Any kind of chocolate Hobbies (Present and Past):...
The Orca Research Pod recently discovered a total of 8 important Cross-Site Scripting (XSS) vulnerabilities within various Apache services on...
In Azure environments, guest users are the go-to option when giving access to a user from a different tenant. Often,...
Bad.Build is a critical design flaw discovered by the Orca Research Pod in the Google Cloud Build service that enables...
Although it’s always preferable to prevent security incidents before they occur, it’s only a matter of time before an attacker...
The state of cloud security is a dynamic and ever-evolving landscape, as both attackers and defenders continuously adapt their tactics...
Microsoft Azure offers a diverse range of services that empower organizations with convenient and scalable cloud infrastructure solutions. However, even...
As we approach the middle of 2023, we thought it an appropriate time to reflect on the cloud security risks...
In recent years, supply chain attacks targeting software developers and suppliers have become increasingly common. The primary objective of these...