Attacks Analysis

IntroductionOrca Security has recently identified a design flaw in Google Cloud Build service, named "Bad.Build." This flaw poses a serious security risk as it enables attackers to execute Privilege Escalation, granting them unauthorized entry into Google's Artifact Registry's code repositories.The consequences of this vulnerability extend...

Code tampering refers to the unauthorised modification or alteration of source code during software application development, testing, or deployment. This malicious activity can have devastating consequences, from introducing security vulnerabilities to altering the intended behaviour of the software, causing it to fail in unexpected ways.  Code tampering...