Beware the Azure Guest User: How to Detect When a Guest User Account Is Being Exploited
In Azure environments, guest users are the go-to option when giving access to a user from a different tenant. Often,...
In Azure environments, guest users are the go-to option when giving access to a user from a different tenant. Often,...
Bad.Build is a critical design flaw discovered by the Orca Research Pod in the Google Cloud Build service that enables...
Although it’s always preferable to prevent security incidents before they occur, it’s only a matter of time before an attacker...
The state of cloud security is a dynamic and ever-evolving landscape, as both attackers and defenders continuously adapt their tactics...
Microsoft Azure offers a diverse range of services that empower organizations with convenient and scalable cloud infrastructure solutions. However, even...
As we approach the middle of 2023, we thought it an appropriate time to reflect on the cloud security risks...
In recent years, supply chain attacks targeting software developers and suppliers have become increasingly common. The primary objective of these...
Here at Orca Security, our team of cloud researchers are continually pushing the cloud security limits to ensure that we...
Today, at BlueHat IL 2023, we proudly announced our discovery of a new vulnerability in Azure, which we've dubbed 'Super...