Bringing Memory to AI: A Look at A2A and MCP-like Technologies Across Platforms
Over the last year, we've witnessed a pivotal shift in how large language models (LLMs) are used - not just...
Over the last year, we've witnessed a pivotal shift in how large language models (LLMs) are used - not just...
Executive Summary: The Orca Research Pod has discovered CVE-2025-48710 in kro (Kube Resource Orchestrator) where an attacker could introduce a malicious CustomResourceDefinition...
On March 24th, 2025, Wiz’s research team published information on five vulnerabilities in the Ingress NGINX Controller for Kubernetes (ingress-nginx)...
Read about the Oracle Cloud Breach Exploiting CVE-2021-35587 and learn how to protect your organization.
Overview of key threats for cloud environments, with a focus on Linux malware, database malware, malicious cryptomining code, and ransomware.
Kubernetes was designed for functionality, not security, but it does include several key settings and policies. Learn more about Kubernetes...
The ‘Google Cloud Platform Storage Explorer’ tool crawls all of your Google Cloud projects and detects which have access to...
The Orca Security Research Pod has been actively tracking cyber attacks leading up to and occurring as part of Russia’s...
A new critical Linux privilege escalation vulnerability was published under the ID CVE-2022-0847, named “Dirty Pipe.”
AutoWarp is a critical vulnerability in Microsoft Azure Automation Service that allows unauthorized access to other customer accounts using the...
How a malicious actor can conduct lateral movement in Google Cloud across compute engine instances using the default service account.
Analyzing customer environments is always a detective task, and when we find structural flaws in a service provider, this is...
Orca Security, as part of an ongoing research effort, discovered a vulnerability in the Databricks platform, and Databricks took swift...