Backlinks
| Referring page | DR | Ref. domains | Linked domains | Anchor and target URL |
|---|---|---|---|---|
|
aws-google-and-azure-cli-tools-could.html
https://thehackernews.com/2024/04/aws-google-and-azure-cli-tools-could.html?m=0
thehackernews.com
|
80 | 1,034 | 1,521 |
said
https://orca.security/resources/blog/leakycli-aws-google-cloud-command-line-tools-can-expose-sensitive-credentials-build-logs
DOFOLLOW
|
|
the-future-of-cloud-security
https://bwgconnect.com/bwg-event/the-future-of-cloud-security
bwgconnect.com
|
7 | 1 | 120 |
(no anchor)
https://orca.security/about?utm_source=ID_BWG*
DOFOLLOW
|
|
governance-for-human-in-the-loop-automation
https://www.moxo.com/blog/governance-for-human-in-the-loop-automation
moxo.com
|
15 | 21 | 155 |
Orca Security
https://orca.security/glossary/rbac-role-based-access-control
DOFOLLOW
|
|
strengthening-cloud-security-a-comprehensive-guide-to-vul...
https://techbusinesstime.com/strengthening-cloud-security-a-comprehensive-guide-to-vulnerability-management-in-cloud-environments
techbusinesstime.com
|
7 | 1 | 274 |
Vulnerability management
https://orca.security/platform/vulnerability-management
DOFOLLOW
|
|
orca-security
https://www.esofund.com/c/orca-security
esofund.com
|
— | 0 | 153 |
Orca Security Job Postings
https://orca.security/about/careers
DOFOLLOW
|
|
orca-security
https://www.esofund.com/c/orca-security
esofund.com
|
— | 0 | 153 |
Orca Security
https://orca.security/
DOFOLLOW
|
|
cloud-sicherheit-beschleunigt-digitale-transformation
https://line-of.biz/sicherheit/cloud-sicherheit-beschleunigt-digitale-transformation
line-of.biz
|
7 | 2 | 201 |
Orca Security
https://orca.security/
DOFOLLOW
|
|
7
https://lists.cert.at/mailman3/hyperkitty/list/[email protected]/2023/7
lists.cert.at
|
8 | 2 | 172 |
https://orca.security/resources/blog/bad-build-google-cloud-build-potential…
https://orca.security/resources/blog/bad-build-google-cloud-build-potential-supply-chain-attack-vulnerability
NOFOLLOW
|
|
google-vertex-ai-security-permissions-could-amplify-insid...
https://www.artiverse.ca/google-vertex-ai-security-permissions-could-amplify-insider-threats
artiverse.ca
|
— | 0 | 293 |
Orca found
https://orca.security/resources/blog/azure-machine-learning-privilege-escalation
DOFOLLOW
|
|
17-new-and-enhanced-challenges-that-can-come-with-a-multi...
https://errandpay.com/17-new-and-enhanced-challenges-that-can-come-with-a-multi-cloud-strategy
errandpay.com
|
— | 0 | 56 |
Orca Security
https://orca.security/
DOFOLLOW
|
|
integrations
https://www.hunters.security/integrations
hunters.security
|
14 | 10 | 189 |
blue arrow icon
https://www.orca.security/
DOFOLLOW
|
|
enterprise-computing-solutions-finops
https://www.planetcrust.com/enterprise-computing-solutions-finops?utm_campaign=blog
planetcrust.com
|
53 | 5 | 487 |
https://orca.security/resources/blog/how-to-get-complete-sbom-of-your-cloud/
https://orca.security/resources/blog/how-to-get-complete-sbom-of-your-cloud
DOFOLLOW
|
|
enterprise-computing-solutions-finops
https://www.planetcrust.com/enterprise-computing-solutions-finops?utm_campaign=blog
planetcrust.com
|
53 | 5 | 487 |
https://orca.security/resources/blog/how-to-get-complete-sbom-of-your-cloud/
https://orca.security/resources/blog/how-to-get-complete-sbom-of-your-cloud
DOFOLLOW
|
|
analyst-notes
https://www.thecyberhut.com/analyst-notes
thecyberhut.com
|
— | 0 | 193 |
new blog focused on debunking some of the typical discussion points around moving to the cloud
https://orca.security/cloud-migration-myths
NOFOLLOW
|
|
crowdstrike-falcon-cloud-security_vs_orca-security
https://www.peerspot.com/products/comparisons/crowdstrike-falcon-cloud-security_vs_orca-security
peerspot.com
|
69 | 59 | 148 |
Orca Security
https://orca.security/
DOFOLLOW
|
|
task
https://help.vuls.biz/manual/task
help.vuls.biz
|
— | 0 | 36 |
orca.security
https://orca.security/resources/blog/php-cgi-vulnerability-cve-2024-4577
DOFOLLOW
|
|
how-aws-is-still-egregiously-egressing
https://www.lastweekinaws.com/podcast/aws-morning-brief/how-aws-is-still-egregiously-egressing
lastweekinaws.com
|
65 | 39 | 427 |
Orca Security
https://orca.security/
DOFOLLOW
|
|
41
https://thecyberwire.com/newsletters/week-that-was/4/41
thecyberwire.com
|
73 | 85 | 3,682 |
Orca Security
https://orca.security/
DOFOLLOW
|
|
risky-biz-news-internal-chats-for
https://riskybiznews.substack.com/p/risky-biz-news-internal-chats-for
riskybiznews.substack.com
|
11 | 7 | 1,488 |
CosMiss
https://orca.security/resources/blog/cosmiss-vulnerability-azure-cosmos-db
DOFOLLOW
|
|
risky-biz-news-putty-crypto-bug-exposes-private-keys-may-...
https://news.risky.biz/risky-biz-news-putty-crypto-bug-exposes-private-keys-may-lead-to-supply-chain-attacks
news.risky.biz
|
14 | 17 | 3,292 |
LeakyCLI
https://orca.security/resources/blog/leakycli-aws-google-cloud-command-line-tools-can-expose-sensitive-credentials-build-logs
DOFOLLOW
|
|
risky-biz-news-israeli-spyware-vendor-65c0ecb2a0e6da001a3...
https://news.risky.biz/risky-biz-news-israeli-spyware-vendor-65c0ecb2a0e6da001a37e1d8
news.risky.biz
|
14 | 17 | 3,292 |
discovered
https://orca.security/resources/blog/azure-shared-key-authorization-exploitation
DOFOLLOW
|
|
risky-biz-news-north-korean-hackers-65c0ecb2a0e6da001a37e1dc
https://news.risky.biz/risky-biz-news-north-korean-hackers-65c0ecb2a0e6da001a37e1dc
news.risky.biz
|
14 | 17 | 3,292 |
CVE-2023-23383
https://orca.security/resources/blog/super-fabrixss-azure-vulnerability
DOFOLLOW
|
|
risky-biz-news-iot-cybersecurity-65c0ecb2a0e6da001a37e1b0
https://news.risky.biz/risky-biz-news-iot-cybersecurity-65c0ecb2a0e6da001a37e1b0
news.risky.biz
|
14 | 17 | 3,292 |
Bad.Build
https://orca.security/resources/blog/bad-build-google-cloud-build-potential-supply-chain-attack-vulnerability
DOFOLLOW
|
|
orca-security-aws-and-the-killer-whale-of-a-problem
https://www.lastweekinaws.com/blog/orca-security-aws-and-the-killer-whale-of-a-problem
lastweekinaws.com
|
65 | 39 | 427 |
cross-account access via AWS Glue
https://orca.security/resources/blog/aws-glue-vulnerability
DOFOLLOW
|
|
orca-security-aws-and-the-killer-whale-of-a-problem
https://www.lastweekinaws.com/blog/orca-security-aws-and-the-killer-whale-of-a-problem
lastweekinaws.com
|
65 | 39 | 427 |
two critical vulnerabilities in AWS
https://orca.security/resources/blog/two-critical-cloud-vulnerabilities
DOFOLLOW
|
|
orca-security-aws-and-the-killer-whale-of-a-problem
https://www.lastweekinaws.com/blog/orca-security-aws-and-the-killer-whale-of-a-problem
lastweekinaws.com
|
65 | 39 | 427 |
an ability to gain control plane access to a CloudFormation host
https://orca.security/resources/blog/aws-cloudformation-vulnerability
DOFOLLOW
|
|
issue-168-safari-15-indexeddb-api-vulnerability-a-pair-of...
https://apisecurity.io/issue-168-safari-15-indexeddb-api-vulnerability-a-pair-of-aws-vulnerabilities-and-an-api-security-podcast
apisecurity.io
|
8 | 3 | 298 |
a vulnerability within the AWS Glue service
https://orca.security/resources/blog/aws-glue-vulnerability
DOFOLLOW
|
|
issue-168-safari-15-indexeddb-api-vulnerability-a-pair-of...
https://apisecurity.io/issue-168-safari-15-indexeddb-api-vulnerability-a-pair-of-aws-vulnerabilities-and-an-api-security-podcast
apisecurity.io
|
8 | 3 | 298 |
a vulnerability affecting the AWS CloudFormation API
https://orca.security/resources/blog/aws-cloudformation-vulnerability
DOFOLLOW
|
|
apache-cordova-harness-esta-siendo-afectado-por-una-vulne...
https://blogs.masterhacks.net/noticias/hacking-y-ciberdelitos/apache-cordova-harness-esta-siendo-afectado-por-una-vulnerabilidad-de-confusion-de-dependencias
blogs.masterhacks.net
|
10 | 4 | 140 |
mostró
https://orca.security/resources/blog/dependency-confusion-supply-chain-attacks
DOFOLLOW
|
|
cloud-security-governance
https://argyleforum.com/events/cloud-security-governance?utm_campaign=ITVS081723&utm_content=Speaker&utm_medium=SPKR&utm_source=organic
argyleforum.com
|
10 | 4 | 118 |
Orca Security
https://orca.security/resources/blog/the-top-5-cloud-security-risks-of-2023
DOFOLLOW
|
|
top-10-pci-dss-solutions-to-secure-your-payment-card-data
https://www.strac.io/blog/top-10-pci-dss-solutions-to-secure-your-payment-card-data
strac.io
|
19 | 2 | 43 |
Orca Security
https://orca.security/
DOFOLLOW
|
|
risky-biz-news-google-search-and-65c0ecb2a0e6da001a37e1fb
https://news.risky.biz/risky-biz-news-google-search-and-65c0ecb2a0e6da001a37e1fb
news.risky.biz
|
14 | 17 | 3,292 |
the issues
https://orca.security/resources/blog/ssrf-vulnerabilities-in-four-azure-services
DOFOLLOW
|
|
CVE-2023-23383
https://feedly.com/cve/CVE-2023-23383
feedly.com
|
88 | 18,531 | 690 |
Meet Orca Security Cloud Threat Researcher Lidor B.Research Pod Archives - Complete Cloud Security in Minutes - Orca Security / 28mois an unassuming, yet very passionate cloud threat researcher at Orca Security with a keen interest in finding vulnerabilities in various cloud provider platforms, particularly in Azure. One of Lidor’s ‘specialities’ is finding vulnerabilities on Microsoft Azure, which recently earned him the #16 ranking on the Microsoft Most Valuable Researcher list, and a speaking slot
https://orca.security/resources/blog/meet-cloud-threat-researcher-lidor-b?utm_source=feedly
DOFOLLOW
|
|
cybersecstats-18-monthly-statistics-round-up-may-june-2025
https://www.cybersecstats.com/cybersecstats-18-monthly-statistics-round-up-may-june-2025?ref=monthly-cybersecstats-statistics-report-newsletter
cybersecstats.com
|
11 | 1 | 97 |
Orca Security
https://orca.security/lp/2025-state-of-cloud-security-report?ref=cybersecstats.com
DOFOLLOW
|
|
https-freemindtronic-com-news-toolshell-sharepoint-vulner...
https://freemindtronic.com/https-freemindtronic-com-news-toolshell-sharepoint-vulnerability-nfc-hsm-defense
freemindtronic.com
|
60 | 7 | 635 |
Orca Security
https://orca.security/resources/blog/orca-cloud-security-score
DOFOLLOW
|
|
18
https://thecyberwire.com/newsletters/business-briefing/2/18
thecyberwire.com
|
73 | 85 | 3,682 |
Orca Security
https://orca.security/
DOFOLLOW
|
|
veckobrev-20-2025
https://heltdigital.se/p/veckobrev-20-2025
heltdigital.se
|
— | 0 | 2,059 |
köper
https://orca.security/resources/blog/orca-security-acquires-opus-agentic-ai-cnapp?amp;utm_campaign=veckobrev-20-2025&utm_medium=referral&utm_source=heltdigital.se
DOFOLLOW
|
|
cybersecurity-threat-advisory-supply-chain-attack-impacti...
https://www.itscnews.com/news/cybersecurity-threat-advisory-supply-chain-attack-impacting-notepad
itscnews.com
|
— | 0 | 21 |
https://orca.security/resources/blog/notepad-plus-plus-supply-chain-attack/
https://orca.security/resources/blog/notepad-plus-plus-supply-chain-attack
DOFOLLOW
|
|
the-ni8mare-collapse-dissecting-cve-2026-21858-cve-2025-6...
https://www.penligent.ai/hackinglabs/es/the-ni8mare-collapse-dissecting-cve-2026-21858-cve-2025-68613-in-ai-orchestration
penligent.ai
|
7 | 2 | 154 |
Investigación de seguridad de Orca sobre "Ni8mare"
https://orca.security/
DOFOLLOW
|
|
atoms.dev
|
66 | 12 | 25 |
26
https://orca.security/resources/blog/agentless-vs-agent-based-security
NOFOLLOW
|
|
cloud-security-posture-management-a-comprehensive-guide
https://techbusinesstime.com/cloud-security-posture-management-a-comprehensive-guide
techbusinesstime.com
|
7 | 1 | 274 |
Cloud Security Posture Management (CSPM)
https://orca.security/platform/cloud-security-posture-management-cspm
DOFOLLOW
|
|
121926793.cms
https://content.techgig.com/technology-unplugged/revolutionizing-global-communication-the-impact-of-multilingual-speech-recognition/articleshow/121926793.cms
content.techgig.com
|
18 | 33 | 197 |
cspm
https://orca.security/resources/blog/what-is-cspm
DOFOLLOW
|
|
network-security
https://www.smilebpi.com/tag/network-security
smilebpi.com
|
15 | 2 | 89 |
Amazon Web Services cloud security
https://orca.security/partners/technology/amazon-web-services-aws
DOFOLLOW
|
|
cormedix-announces-closing-7-5-million-senior-secured-con...
https://cormedix.com/cormedix-announces-closing-7-5-million-senior-secured-convertible-debt-financing
cormedix.com
|
17 | 3 | 28 |
cloud native security
https://orca.security/
DOFOLLOW
|
|
zero-trust-security
https://aws.amazon.com/partners/featured/zero-trust-security
aws.amazon.com
|
87 | 9,102 | 2,584 |
Read the eBook
https://orca.security/lp/5-ways-orca-security-and-aws-establish-zero-trust-in-the-cloud
DOFOLLOW
|
|
what-is-ciem-and-how-does-it-work
https://complytec.com/blog/what-is-ciem-and-how-does-it-work
complytec.com
|
49 | 3 | 47 |
Orca Security
https://orca.security/resources/blog/what-is-cloud-infrastructure-entitlements-management-ciem
DOFOLLOW
|
|
what-is-ciem-and-how-does-it-work
https://complytec.com/blog/what-is-ciem-and-how-does-it-work
complytec.com
|
49 | 3 | 47 |
Orca Security
https://orca.security/resources/blog/cwpp-cspm-ciem-cnapp
DOFOLLOW
|
|
cloud-computing-vulnerabilities
https://www.cloudwards.net/cloud-computing-vulnerabilities
cloudwards.net
|
71 | 174 | 204 |
Orca 2024 State of Cloud Security Report
https://orca.security/wp-content/uploads/2024/02/2024-State-of-Cloud-Security-Report.pdf
DOFOLLOW
|
|
australian-security-teams-inundated-with-inaccurate-alert...
https://www.technologydecisions.com.au/content/security/news/australian-security-teams-inundated-with-inaccurate-alerts-558352621
technologydecisions.com.au
|
15 | 13 | 196 |
here
https://orca.security/lp/2022-cloud-security-alert-fatigue-report
DOFOLLOW
|
|
privilege-escalation-proof-of-concept-in-google-cloud
https://thecyberwire.com/stories/88a832e8f2e2449dafa97f0c05b52a8a/privilege-escalation-proof-of-concept-in-google-cloud
thecyberwire.com
|
73 | 85 | 3,682 |
privilege escalation vulnerability
https://orca.security/resources/blog/bad-build-google-cloud-build-potential-supply-chain-attack-vulnerability
DOFOLLOW
|
Frequently Asked Questions
How many backlinks does orca.security have?
The backlinks page for orca.security shows all individual inbound links discovered in our crawl of the web. Each backlink represents a hyperlink on another website that points to a page on orca.security. Use the filters to narrow results by dofollow/nofollow status, domain rating, or anchor text.
What is a backlink?
A backlink is a hyperlink on one website that points to a page on a different website. Backlinks are one of the most important ranking factors in search engine algorithms because they act as votes of confidence from other sites. The more high-quality backlinks a domain has, the more authority search engines assign to it.
Are the backlinks to orca.security dofollow or nofollow?
Backlinks to orca.security include both dofollow and nofollow links. Dofollow links pass link equity (ranking power) to the target site, while nofollow links include a rel="nofollow" attribute that tells search engines not to pass authority. Both types contribute to a natural backlink profile, but dofollow links carry more SEO weight. You can filter by link type using the rel filter above the table.
How often is backlink data updated?
Backlink data is updated monthly when our web crawler completes a new cycle. Our pipeline processes billions of web pages to discover new backlinks, track lost links, and update domain authority scores. The freshness of data depends on when our crawler last visited the referring pages.