Using AI to Detect Cloud Anomalies: A Supply Chain Attack Example
Although it’s always preferable to prevent security incidents before they occur, it’s only a matter of time before an attacker...
Although it’s always preferable to prevent security incidents before they occur, it’s only a matter of time before an attacker...
The state of cloud security is a dynamic and ever-evolving landscape, as both attackers and defenders continuously adapt their tactics...
Microsoft Azure offers a diverse range of services that empower organizations with convenient and scalable cloud infrastructure solutions. However, even...
As we approach the middle of 2023, we thought it an appropriate time to reflect on the cloud security risks...
In recent years, supply chain attacks targeting software developers and suppliers have become increasingly common. The primary objective of these...
Here at Orca Security, our team of cloud researchers are continually pushing the cloud security limits to ensure that we...
Today, at BlueHat IL 2023, we proudly announced our discovery of a new vulnerability in Azure, which we've dubbed 'Super...
We're excited to announce the release of our new free community cloud security tool IAM AWS Policy Evaluator (IAM APE),...
Wait, did you say ‘Cross-Cloud Provider Attacks’? Yes, this is actually a growing type of attack path: As organizations increasingly...