How to Protect Against Midnight Blizzard-Style Kill Chains
Last week, Microsoft revealed that the Russia-based threat actor group known as Midnight Blizzard, Cozy Bear, and APT29 had compromised...
Last week, Microsoft revealed that the Russia-based threat actor group known as Midnight Blizzard, Cozy Bear, and APT29 had compromised...
The Orca Research Pod has uncovered a dangerous loophole in Google Kubernetes Engine (GKE) that could allow an attacker with...
Following our discovery of a critical loophole in Google Kubernetes Engine (GKE) dubbed Sys:All, we decided to conduct research into...
It’s hard to believe that 2023 is nearing its end. As we look ahead to 2024, the Orca Research Pod...
The Orca Research Pod has made an important discovery that puts Google Cloud Dataproc clusters at risk for data theft,...
The highly anticipated Common Vulnerability Scoring System (CVSS) version 4 is planned to be released on October 31st by the...
Fun Facts About Lidor Beverage of choice: Coffee or soda Go-to snack: Any kind of chocolate Hobbies (Present and Past):...
The Orca Research Pod recently discovered a total of 8 important Cross-Site Scripting (XSS) vulnerabilities within various Apache services on...
In Azure environments, guest users are the go-to option when giving access to a user from a different tenant. Often,...