s1ngularity Supply Chain Attack: What It Means for Cloud and AI Security
On August 26, 2025, the open-source ecosystem was shaken by a new supply chain attack that targeted Nx, a popular...
On August 26, 2025, the open-source ecosystem was shaken by a new supply chain attack that targeted Nx, a popular...
Orca has detected that the role {AwsIamRole} was granted full administrative privileges on the account. These privileges grant them the...
We have found that the web-service {service_detailed} on the system was not patched for several months. It is important to...
AWS API call was detected from IP address which is categorized as suspicious
An AWS Security Group acts as a virtual firewall for your instances to control inbound and outbound traffic. We identified...
An AWS Security Group acts as a virtual firewall for your instances to control inbound and outbound traffic. We identified...
The Installed operating system {Compute.DistributionName} {Compute.DistributionVersion} has reached end of support since {Compute.OsEndOfSupport} and does not get security patches. This...
AWS lambda function {AwsLambdaFunction} was detected running with an outdated runtime
Kubernetes supports mounting secrets as data volumes or as environment variables. It is reasonably common for application code to log...
Docker privileged mode grants a Docker container root capabilities to all devices on the host system. Controller {K8sController} was found...