blog.aquasec.com Open in urlscan Pro
2606:2c40::c73c:671c  Public Scan

Submitted URL: https://info.aquasec.com/e3t/Ctc/WX+113/cbBhS04/MWr2wK1W9mPW4nfXvD9c6MGlW8SvcRS590QgDN5l4bjq3prCCW6N1vHY6lZ3kxW1wr6wB8jbF...
Effective URL: https://blog.aquasec.com/?utm_campaign=Friday%20Light&utm_medium=email&_hsmi=292372853&_hsenc=p2ANqtz-_j8zVMEl5gXUoQW3xHY...
Submission: On February 02 via manual from SE — Scanned from SE

Form analysis 2 forms found in the DOM

GET https://blog.aquasec.com/hs-search-results

<form action="https://blog.aquasec.com/hs-search-results" method="GET">
  <input type="text" class="navbar_search_input" name="term" autocomplete="off" placeholder="Enter a keyword to search the blog">
  <input type="hidden" name="type" value="BLOG_POST">
  <input type="hidden" name="length" value="SHORT">
  <input type="submit" class="navbar_submit_button" value="Search">
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/fc3a461b-474b-4bd2-b409-c41d4ec09d8a

<form id="hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/fc3a461b-474b-4bd2-b409-c41d4ec09d8a"
  class="hs-form-private hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a hs-form-fc3a461b-474b-4bd2-b409-c41d4ec09d8a hs-form-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_5887a9aa-1b77-4918-8267-669f2d9ce443 hs-form stacked"
  target="target_iframe_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" data-instance-id="5887a9aa-1b77-4918-8267-669f2d9ce443" data-form-id="fc3a461b-474b-4bd2-b409-c41d4ec09d8a" data-portal-id="1665891"
  data-test-id="hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your Email Address" for="email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>Email
        Address</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_blog_default_hubspot_blog_subscription hs-blog_default_hubspot_blog_subscription hs-fieldtype-radio field hs-form-field" style="display: none;"><label
      id="label-blog_default_hubspot_blog_subscription-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your Notification Frequency"
      for="blog_default_hubspot_blog_subscription-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>Notification Frequency</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="blog_default_hubspot_blog_subscription" class="hs-input" type="hidden" value="instant"></div>
  </div>
  <div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_source-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your UTM_Source"
      for="utm_source-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>UTM_Source</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_source" class="hs-input" type="hidden" value="hs_automation"></div>
  </div>
  <div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_campaign-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your UTM_Campaign"
      for="utm_campaign-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>UTM_Campaign</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_campaign" class="hs-input" type="hidden" value="Friday Light"></div>
  </div>
  <div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_medium-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your UTM_Medium"
      for="utm_medium-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>UTM_Medium</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_medium" class="hs-input" type="hidden" value="email"></div>
  </div>
  <div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_content-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your UTM_Content"
      for="utm_content-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>UTM_Content</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_content" class="hs-input" type="hidden" value="292372853"></div>
  </div>
  <div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_term-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your UTM_Term"
      for="utm_term-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>UTM_Term</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_term" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1706870599886&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1697734178444&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;isLegacyThemeAllowed&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Cloud native applications security&quot;,&quot;pageUrl&quot;:&quot;https://blog.aquasec.com/?utm_campaign=Friday%20Light&amp;utm_medium=email&amp;_hsmi=292372853&amp;_hsenc=p2ANqtz-_j8zVMEl5gXUoQW3xHY4ZOlF_5fTrR7RELgpxxdqd77fVFGAGBtp8k3k-MMtmGkU6XBUEeO-hA6-B6aJjFCqa95dA5Gg&amp;utm_content=292372853&amp;utm_source=hs_automation&quot;,&quot;pageId&quot;:&quot;3657573699&quot;,&quot;urlParams&quot;:{&quot;utm_campaign&quot;:&quot;Friday Light&quot;,&quot;utm_medium&quot;:&quot;email&quot;,&quot;_hsmi&quot;:&quot;292372853&quot;,&quot;_hsenc&quot;:&quot;p2ANqtz-_j8zVMEl5gXUoQW3xHY4ZOlF_5fTrR7RELgpxxdqd77fVFGAGBtp8k3k-MMtmGkU6XBUEeO-hA6-B6aJjFCqa95dA5Gg&quot;,&quot;utm_content&quot;:&quot;292372853&quot;,&quot;utm_source&quot;:&quot;hs_automation&quot;},&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://blog.aquasec.com&quot;,&quot;contentType&quot;:&quot;listing-page&quot;,&quot;hutk&quot;:&quot;9bbfbe8dfc2ce0778bf5539720b34fed&quot;,&quot;__hsfp&quot;:2032787945,&quot;__hssc&quot;:&quot;207889101.1.1706870601700&quot;,&quot;__hstc&quot;:&quot;207889101.9bbfbe8dfc2ce0778bf5539720b34fed.1706870601699.1706870601699.1706870601699.1&quot;,&quot;formTarget&quot;:&quot;#hs_form_target_module_14617475123031299_1202&quot;,&quot;formInstanceId&quot;:&quot;1202&quot;,&quot;pageName&quot;:&quot;Cloud native applications security&quot;,&quot;rumScriptExecuteTime&quot;:1008.8999996185303,&quot;rumTotalRequestTime&quot;:1260.1000003814697,&quot;rumTotalRenderTime&quot;:1280.6000003814697,&quot;rumServiceResponseTime&quot;:251.20000076293945,&quot;rumFormRenderTime&quot;:20.5,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1706870601707,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;1665891&quot;,&quot;formId&quot;:&quot;fc3a461b-474b-4bd2-b409-c41d4ec09d8a&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hs_form_target_module_14617475123031299_1202&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;1202&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms&quot;,&quot;css&quot;:&quot;&quot;,&quot;inlineMessage&quot;:&quot;Thanks for Subscribing!&quot;,&quot;isMobileResponsive&quot;:true,&quot;pageName&quot;:&quot;Cloud native applications security&quot;,&quot;pageId&quot;:&quot;3657573699&quot;,&quot;contentType&quot;:&quot;listing-page&quot;,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked&quot;},&quot;isCMSModuleEmbed&quot;:true},&quot;correlationId&quot;:&quot;5887a9aa-1b77-4918-8267-669f2d9ce443&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;blog_default_hubspot_blog_subscription&quot;,&quot;utm_source&quot;,&quot;utm_campaign&quot;,&quot;utm_medium&quot;,&quot;utm_content&quot;,&quot;utm_term&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.4638&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.4638&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;4638&quot;,&quot;allPageIds&quot;:{&quot;embedContextPageId&quot;:&quot;3657573699&quot;,&quot;analyticsPageId&quot;:&quot;3657573699&quot;,&quot;contentPageId&quot;:0,&quot;contentAnalyticsPageId&quot;:&quot;3657573699&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1706870599995,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Cloud native applications security\&quot;,\&quot;pageUrl\&quot;:\&quot;https://blog.aquasec.com/?utm_campaign=Friday%20Light&amp;utm_medium=email&amp;_hsmi=292372853&amp;_hsenc=p2ANqtz-_j8zVMEl5gXUoQW3xHY4ZOlF_5fTrR7RELgpxxdqd77fVFGAGBtp8k3k-MMtmGkU6XBUEeO-hA6-B6aJjFCqa95dA5Gg&amp;utm_content=292372853&amp;utm_source=hs_automation\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36\&quot;,\&quot;urlParams\&quot;:{\&quot;utm_campaign\&quot;:\&quot;Friday Light\&quot;,\&quot;utm_medium\&quot;:\&quot;email\&quot;,\&quot;_hsmi\&quot;:\&quot;292372853\&quot;,\&quot;_hsenc\&quot;:\&quot;p2ANqtz-_j8zVMEl5gXUoQW3xHY4ZOlF_5fTrR7RELgpxxdqd77fVFGAGBtp8k3k-MMtmGkU6XBUEeO-hA6-B6aJjFCqa95dA5Gg\&quot;,\&quot;utm_content\&quot;:\&quot;292372853\&quot;,\&quot;utm_source\&quot;:\&quot;hs_automation\&quot;},\&quot;pageId\&quot;:\&quot;3657573699\&quot;,\&quot;contentAnalyticsPageId\&quot;:\&quot;3657573699\&quot;,\&quot;contentPageId\&quot;:0,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1706870599996,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;NO\&quot;&quot;},{&quot;clientTimestamp&quot;:1706870601704,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;9bbfbe8dfc2ce0778bf5539720b34fed\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://blog.aquasec.com\&quot;,\&quot;contentType\&quot;:\&quot;listing-page\&quot;,\&quot;pageId\&quot;:\&quot;3657573699\&quot;}&quot;}]}"><iframe
    name="target_iframe_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" style="display: none;"></iframe>
</form>

Text Content

Aqua uses website cookies to give visitors a better service. To find out more
about the cookies we use, see our Privacy Policy

Accept Decline
Aqua Security
 * Products
 * Solutions
 * Resources
 * Company

Search Sign In Try Aqua


Aqua Blog
Expert insight, best practices and advice on cloud native security, trends,
threat intelligence and compliance





MITIGATING LEAKY VESSELS VULNERABILITIES IN RUNC, BUILDKIT AND MOBY WITH AQUA

Aqua Nautilus Security Research Team
February 01, 2024

On January 31, 2024, researchers revealed the discovery of four severe security
vulnerabilities in the container ecosystem. These vulnerabilities, affecting key
components including runc, BuildKit, Moby (Docker Engine), and Docker Desktop,
pose significant risks to the security and integrity of applications that use …

Continue reading ›


HEADCRAB 2.0: EVOLVING THREAT IN REDIS MALWARE LANDSCAPE

Asaf Eitani Nitzan Yaakov
January 29, 2024

At the beginning of 2023, Aqua Nautilus researchers uncovered HeadCrab - an
advanced threat actor utilizing a state-of-the-art, custom-made malware that
compromised 1,200 Redis servers. As you know in the ever-evolving world of
cybersecurity, threat actors continually adapt and refine their techniques.
Recently, our …

Continue reading ›


THE GAPS IN OPEN SOURCE GOVERNANCE THAT THREATEN THE SOFTWARE SUPPLY CHAIN

Mor Weinberger Naor Talmor
January 23, 2024

The widespread issue of unmaintained and deprecated npm packages recently
discovered by Aqua researchers affects more than a fifth of open source
packages. Presenting yet another silent example of hidden threats to the
software supply chain, it demonstrates how poor operational and structural
integrity of dependencies …

Continue reading ›


DECEPTIVE DEPRECATION: THE TRUTH ABOUT NPM DEPRECATED PACKAGES

Ilay Goldman Yakir Kadkoda
January 18, 2024

Researchers at Aqua Nautilus found that 8.2% percent of the most downloaded npm
packages are officially deprecated, but due to inconsistent practices in
handling package dependencies, the real number is much larger, closer to 21.2%.
Moreover, some package maintainers, when confronted with security flaws,
deprecate …

Continue reading ›


APACHE APPLICATIONS TARGETED BY STEALTHY ATTACKER

Nitzan Yaakov Assaf Morag
January 08, 2024
Researchers at Aqua Nautilus have uncovered a new attack targeting Apache Hadoop
and Flink applications. This attack is particularly intriguing due to the
attacker's use of packers and rootkits to conceal the malware. The simplicity
with which these techniques are employed presents a significant challenge to …
Continue reading ›


2024 CYBERSECURITY TRENDS: AI, CLOUD, AND THREAT INTELLIGENCE

Aqua Nautilus Security Research Team
January 04, 2024

As we begin this new year, we see the landscape of cybersecurity poised to
witness a surge in AI-driven attacks, propelling the industry into a rapid cycle
of innovation. Defenders are on a quest to develop advanced AI-based security
measures, not just to detect and respond to threats in real-time, but to predict
and …

Continue reading ›


THE TX-RAMP CERTIFICATION: A VITAL CREDENTIAL FOR AQUA SECURITY

Youssef Takhssaiti
January 02, 2024

In today's digital age, data security is important. With organizations
increasingly migrating their operations to the cloud, the need for robust cloud
security solutions has never been greater. One significant credential that
stands out in the realm of cloud security is the TX-RAMP (Texas Risk Assessment
and …

Continue reading ›


ELECTION DYNAMICS: PREDICTIONS FOR THE U.S. FEDERAL GOVERNMENT

Youssef Takhssaiti
December 27, 2023

As we approach 2024, the U.S. Federal Government stands at a critical juncture
in cybersecurity. With the backdrop of an election year, emerging technological
trends, and evolving cyber threats, it’s essential to anticipate the challenges
and opportunities that lie ahead. Drawing from insights of recent expert …

Continue reading ›


THE EVOLVING LANDSCAPE OF CLOUD SECURITY: OUR PREDICTIONS FOR 2024

Michal Lewy Harush
December 19, 2023

In the ever-shifting realm of cybersecurity, where innovation and uncertainty
intertwine, the year 2023 has been nothing short of chaos. As the dark
underbelly of AI-powered threats surfaces, and court rulings redefine the
consequences of security failures, the security industry stands at a pivotal
juncture. CISOs …

Continue reading ›


LASTING LEGACY OF LOG4J: LESSONS FOR RUNTIME SECURITY

Erin Stephan
December 13, 2023

Another December is upon us, stores are full of shoppers, lights are
illuminating cities, towns and cul-de-sacs as radio stations bombard listeners
with the continuous rotation of holiday music. Yet amongst all this merriment
sits the IT security professional behind their screen completing their end of
year tasks. …

Continue reading ›


QUANTIFYING THE BUSINESS VALUE OF CNAPP: TOTAL ECONOMIC IMPACT STUDY

Erin Stephan
December 06, 2023

Businesses have been embracing cloud native technologies because of their
elasticity and flexibility. They allow enterprises to quickly scale and develop
applications that are built with services packaged in containers, deployed as
microservices and managed on elastic infrastructure through agile DevOps
processes and …

Continue reading ›
All posts Next →


SUBSCRIBE TO EMAIL UPDATES

Email Address*

Notification Frequency

UTM_Source

UTM_Campaign

UTM_Medium

UTM_Content

UTM_Term





POPULAR POSTS

 * Kubernetes Exposed: One Yaml away from Disaster
 * The Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secrets
 * Looney Tunables Vulnerability Exploited by Kinsing
 * 50 Shades of Vulnerabilities: Uncovering Flaws in Open-Source Vulnerability
   Disclosures
 * PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks


FILTER BY TOPIC

 * Container Security (111)
 * Kubernetes Security (96)
 * Security Threats (96)
 * Cloud Native Security (82)
 * Image Vulnerability Scanning (49)
 * Aqua Open Source (47)
 * AWS Security (36)
 * Docker Security (35)
 * Runtime Security (35)
 * Aqua Security (34)
 * Vulnerability Management (34)
 * Software Supply Chain Security (28)
 * CSPM (27)
 * Cloud compliance (24)
 * Container Vulnerability (24)
 * DevSecOps (24)
 * CI/CD (17)
 * CNAPP (17)
 * Supply Chain Attacks (13)
 * Secrets (12)
 * Application Security (11)
 * Serverless-Security (11)
 * Kubernetes (10)
 * ebpf (10)
 * Host Security (9)
 * Advanced malware protection (8)
 * Cloud security conferences (8)
 * Fargate (8)
 * Malware Attacks (8)
 * Cloud Workload Protection Platform CWPP (7)
 * Hybrid Cloud Security (7)
 * Attack Vector (6)
 * Container platforms (6)
 * Google cloud security (6)
 * OpenShift (6)
 * SBOMs (6)
 * Secure VM (6)
 * Security Policy (6)
 * Cloud security (5)
 * Infrastructure-as-Code (IaC) (5)
 * Security Automation (5)
 * Windows Containers (5)
 * Azure security (4)
 * Docker containers (4)
 * Kubernetes RBAC (4)
 * Service Mesh (4)
 * Container Deployment (3)
 * IBM Cloud (3)
 * Microservices (3)
 * Nano-Segmentation (3)
 * Agentless Security (2)
 * FaaS (2)
 * Network Firewall (2)
 * VMware Tanzu (2)
 * code security (2)
 * Advanced Threat Mitigation (1)
 * Cloud VM (1)
 * Drift Prevention (1)
 * Kubernetes Authorization (1)
 * Network (1)
 * shift Left security (1)

Show more...
Aqua Container Security

Aqua Security is the largest pure-play cloud native security company, providing
customers the freedom to innovate and accelerate their digital transformations.
The Aqua Platform is the leading Cloud Native Application Protection Platform
(CNAPP) and provides prevention, detection, and response automation across the
entire application lifecycle to secure the supply chain, secure cloud
infrastructure and secure running workloads wherever they are deployed.

Aqua customers are among the world’s largest enterprises in financial services,
software, media, manufacturing and retail, with implementations across a broad
range of cloud providers and modern technology stacks spanning containers,
serverless functions and cloud VMs.


Copyright © 2023 Aqua Security Software Ltd.
Use Cases
 * Automate DevSecOps
 * Modernize Security
 * Compliance and Auditing
 * Serverless Containers & Functions
 * Hybrid and Multi Cloud

Environments
 * Kubernetes Security
 * OpenShift Security
 * Docker Security
 * AWS Cloud Security
 * Azure Cloud Security
 * Google Cloud Security
 * VMware PKS Security

Contact Us
 * Contact Us
 * Contact Support

Products
 * Aqua Cloud native security
 * Open Source Container Security
 * Platform Integrations

Resources
 * Live Webinars
 * O’Reilly Book: Kubernetes Security
 * Cloud native Wiki

About Us
 * About Aqua
 * Newsroom
 * Careers








Runtime security for cloud native environments
Webinar series
Sign up now 🡲
Subscribe to the blog
Get the latest cloud native insights from our experts!
email address
Sign Up
Thank you!