Meet IAM APE: An Open Source Tool to Simplify AWS IAM Policy Management
We're excited to announce the release of our new free community cloud security tool IAM AWS Policy Evaluator (IAM APE),...
We're excited to announce the release of our new free community cloud security tool IAM AWS Policy Evaluator (IAM APE),...
Wait, did you say ‘Cross-Cloud Provider Attacks’? Yes, this is actually a growing type of attack path: As organizations increasingly...
Cloud storage buckets, such as Amazon S3 Buckets, Azure Blob storage and GCP storage buckets, are a popular storage solution...
As more organizations adopt containerized infrastructure, the need for effective security practices becomes increasingly important. Recently released by the OWASP...
Elastic IPs (EIPs) are public and static IPv4 addresses provided by AWS. EIPs can be viewed as a pool of...
As part of the Orca Research Pod efforts, we regularly research various cloud provider services and capabilities to help our...
In this blog we describe how we uncovered an SSRF Vulnerability in the Azure DigitalTwins Explorer service, allowing any unauthenticated...
In this blog we describe how we uncovered an SSRF Vulnerability in Azure Functions allowing any unauthenticated user to request...
In this blog we describe how we uncovered an important Server-Side Request Forgery (SSRF) Vulnerability on Azure API Management Service,...