Headlines
Security Vulnerability in Google Cloud Build Allows Unauthorized Access and Manipulationwordpress,security,vulnerability,GoogleCloudBuild,unauthorizedaccess,manipulation

Security Vulnerability in Google Cloud Build Allows Unauthorized Access and Manipulation

A Newly Discovered Vulnerability in Google Cloud Build Raises Supply Chain Security Concerns The Bad.Build Issue Researchers at Orca Security recently uncovered a vulnerability in Google Cloud Build, a service that enables users to build, test, and deploy applications on the Google Cloud Platform. The vulnerability, dubbed Bad.Build, allows attackers to tamper with and inject…

Read More
Azure's XSS Vulnerabilities Expose User Sessions to Unauthorized Accessazure,xss,vulnerabilities,usersessions,unauthorizedaccess

Azure’s XSS Vulnerabilities Expose User Sessions to Unauthorized Access

Cloud Security XSS Vulnerabilities in Azure Led to Unauthorized Access to User Sessions Introduction In a recent report, cloud security firm Orca identified and Microsoft resolved two cross-site scripting (XSS) vulnerabilities in Azure Bastion and Azure Container Registry (ACR) that could have led to unauthorized access to user sessions, data tampering, and service disruptions. The…

Read More