Bringing Memory to AI: A Look at A2A and MCP-like Technologies Across Platforms
Over the last year, we've witnessed a pivotal shift in how large language models (LLMs) are used - not just...
Over the last year, we've witnessed a pivotal shift in how large language models (LLMs) are used - not just...
Executive Summary: The Orca Research Pod has discovered CVE-2025-48710 in kro (Kube Resource Orchestrator) where an attacker could introduce a malicious CustomResourceDefinition...
On March 24th, 2025, Wiz’s research team published information on five vulnerabilities in the Ingress NGINX Controller for Kubernetes (ingress-nginx)...
Read about the Oracle Cloud Breach Exploiting CVE-2021-35587 and learn how to protect your organization.
Check out this Orca Security article that outlines infrastructure as code (IaC) security risks and offers recommended methods for protecting...
Recently, the Orca Security research team discovered SynLapse, a tenant separation violation vulnerability in the Microsoft Azure Synapse environment.
A threat actor recently hacked a popular PyPi repo on GitHub, setting off a supply chain attack that could have...
This security advisory addresses a tenant separation issue in the Microsoft Azure Synapse service.
Protestware malicious code found in NPM package node-ipc in Russia / Belarus, overwriting entire file systems with heart emojis to...
A GCP Organization is the top node of the permissions hierarchy, making policies defined at this level powerful, automatically applying...
Orca researcher Lidor Ben Shitrit reveals how Log4 shell TTPs in an AWS cloud environment can be used to open...
On March 25, 2022, a PoC was published for the 4-year old CVE-2018-25032 in Zlib open source software that everyone...
BreakingFormation is an XML External Entity (XXE) vulnerability found in AWS CloudFormation that led to local file disclosure, directory listing,...