News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cloud vulnerabilities allow access to critical data
Cloud vulnerabilities allow access to critical data

As a new Orca Security Report shows, cloud vulnerabilities allow access to critical data in just three steps: known vulnerabilities, unsecured storage resources, and failure to follow best practices allow for an average cloud attack path of just three steps to directly access an organization's crown jewels reach. Orca Security has released the 2022 State of the Public Cloud Security Report. The study provides important insights into the current state of public cloud security and shows where the most critical security gaps can be found. One of the key findings of the report is that the average attack path is just three steps...

Read more

Microsoft only closes known vulnerabilities after 100 days
Microsoft only closes known vulnerabilities after 100 days

Orca Security criticizes the slow reaction from Microsoft in fixing the SynLapse vulnerability, which was only closed after 100 days. Further isolation and hardening for better cloud security is recommended. Although SynLapse (CVE-2022-29972) is a Critical vulnerability, it has taken Microsoft over 100 days to complete the necessary steps to resolve the vulnerability. 100 days of open vulnerability After Microsoft was informed about the SynLapse vulnerability on January 4th and after several follow-ups, the first patch was only provided in March, which Orca Security was able to bypass. Microsoft has the original…

Read more

Critical Azure Automation vulnerability
B2B Cyber ​​Security ShortNews

AutoWarp is a critical vulnerability in the Azure Automation service that allows unauthorized access to other Azure customer accounts using the service. Depending on the privileges assigned by the customer, this attack could mean complete control over the target account's resources and data. Microsoft Azure Automation enables organizations to run automation code in a managed manner. You can schedule jobs, provide input and output, and more. Each company's automation code runs in a sandbox, isolated from other customers' code running on the same virtual machine. Vulnerability could have caused billions of dollars in damage Investigating…

Read more

First encyclopedia for cloud risks
B2B Cyber ​​Security ShortNews

Continuously updated information source for cloud security best practices. Orca Security launches industry-first cloud risk encyclopedia. Cloud Security Innovator opens its collection of 900+ covered cloud risks along with targeted remediation strategies to share industry knowledge. Orca Security, the innovation leader in cloud security, today released the Orca Cloud Risk Encyclopedia, which serves as a global resource for practitioners and researchers throughout the InfoSec community. The rapid adoption of clouds, the increasing complexity of multi-cloud, and the shortage of cloud security professionals have all contributed to widening the cloud security knowledge gap….

Read more

Multi-cloud security and compliance
Multi-cloud security and compliance

Companies are increasingly relocating their operations not just to one, but in many cases to several public clouds. In HashiCorp's recent State of the Cloud Strategy Survey, 76 percent of respondents said they already have multi-cloud strategies in place. Another 47 percent of these respondents agreed that security is a key barrier to the cloud. Orca Security identifies challenges and best practices. Multi-cloud strategies further complicate cloud security and compliance by requiring controls and policies to be applied consistently across multiple cloud environments. By following a set of best practices, security teams can…

Read more