BreakingFormation: Orca Security Research Team Discovers AWS CloudFormation Vulnerability
Orca Security’s vulnerability researcher, Tzah Pahima, discovered a vulnerability in AWS allowing file and credential disclosure of an AWS internal...
Orca Security’s vulnerability researcher, Tzah Pahima, discovered a vulnerability in AWS allowing file and credential disclosure of an AWS internal...
Orca's Research Team discovered a critical vulnerability that could allow an actor to create resources and access data of AWS...
In the third part of the Orca Security blog post series about Azure AD and IAM, Roee shares research on...
Table of contentsWhat are managed identities?Getting a managed identity access tokenThe known privilege escalation methodMy research objectivesEscalation to managed identities’...
Google’s approach to Identity and Access Management is relatively the most straightforward among the three major cloud providers.
A short tutorial on Azure Active Directory (AD) & IAM to lay the the groundwork for future posts.
Orca Security breaks down the anatomy of an Identity and Access Management based cyber attack on AWS, and how to...