blog.aquasec.com
Open in
urlscan Pro
2606:2c40::c73c:671c
Public Scan
Submitted URL: https://info.aquasec.com/e3t/Ctc/WX+113/cbBhS04/MWr2wK1W9mPW4nfXvD9c6MGlW8SvcRS590QgDN5l4bjq3prCCW6N1vHY6lZ3kxW1wr6wB8jbF...
Effective URL: https://blog.aquasec.com/?utm_campaign=Friday%20Light&utm_medium=email&_hsmi=292372853&_hsenc=p2ANqtz-_j8zVMEl5gXUoQW3xHY...
Submission: On February 02 via manual from SE — Scanned from SE
Effective URL: https://blog.aquasec.com/?utm_campaign=Friday%20Light&utm_medium=email&_hsmi=292372853&_hsenc=p2ANqtz-_j8zVMEl5gXUoQW3xHY...
Submission: On February 02 via manual from SE — Scanned from SE
Form analysis
2 forms found in the DOMGET https://blog.aquasec.com/hs-search-results
<form action="https://blog.aquasec.com/hs-search-results" method="GET">
<input type="text" class="navbar_search_input" name="term" autocomplete="off" placeholder="Enter a keyword to search the blog">
<input type="hidden" name="type" value="BLOG_POST">
<input type="hidden" name="length" value="SHORT">
<input type="submit" class="navbar_submit_button" value="Search">
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/fc3a461b-474b-4bd2-b409-c41d4ec09d8a
<form id="hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/fc3a461b-474b-4bd2-b409-c41d4ec09d8a"
class="hs-form-private hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a hs-form-fc3a461b-474b-4bd2-b409-c41d4ec09d8a hs-form-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_5887a9aa-1b77-4918-8267-669f2d9ce443 hs-form stacked"
target="target_iframe_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" data-instance-id="5887a9aa-1b77-4918-8267-669f2d9ce443" data-form-id="fc3a461b-474b-4bd2-b409-c41d4ec09d8a" data-portal-id="1665891"
data-test-id="hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your Email Address" for="email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>Email
Address</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_blog_default_hubspot_blog_subscription hs-blog_default_hubspot_blog_subscription hs-fieldtype-radio field hs-form-field" style="display: none;"><label
id="label-blog_default_hubspot_blog_subscription-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your Notification Frequency"
for="blog_default_hubspot_blog_subscription-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>Notification Frequency</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="blog_default_hubspot_blog_subscription" class="hs-input" type="hidden" value="instant"></div>
</div>
<div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_source-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your UTM_Source"
for="utm_source-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>UTM_Source</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="utm_source" class="hs-input" type="hidden" value="hs_automation"></div>
</div>
<div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_campaign-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your UTM_Campaign"
for="utm_campaign-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>UTM_Campaign</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="utm_campaign" class="hs-input" type="hidden" value="Friday Light"></div>
</div>
<div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_medium-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your UTM_Medium"
for="utm_medium-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>UTM_Medium</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="utm_medium" class="hs-input" type="hidden" value="email"></div>
</div>
<div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_content-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your UTM_Content"
for="utm_content-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>UTM_Content</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="utm_content" class="hs-input" type="hidden" value="292372853"></div>
</div>
<div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_term-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" class="" placeholder="Enter your UTM_Term"
for="utm_term-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202"><span>UTM_Term</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="utm_term" class="hs-input" type="hidden" value=""></div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1706870599886","formDefinitionUpdatedAt":"1697734178444","renderRawHtml":"true","isLegacyThemeAllowed":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36","pageTitle":"Cloud native applications security","pageUrl":"https://blog.aquasec.com/?utm_campaign=Friday%20Light&utm_medium=email&_hsmi=292372853&_hsenc=p2ANqtz-_j8zVMEl5gXUoQW3xHY4ZOlF_5fTrR7RELgpxxdqd77fVFGAGBtp8k3k-MMtmGkU6XBUEeO-hA6-B6aJjFCqa95dA5Gg&utm_content=292372853&utm_source=hs_automation","pageId":"3657573699","urlParams":{"utm_campaign":"Friday Light","utm_medium":"email","_hsmi":"292372853","_hsenc":"p2ANqtz-_j8zVMEl5gXUoQW3xHY4ZOlF_5fTrR7RELgpxxdqd77fVFGAGBtp8k3k-MMtmGkU6XBUEeO-hA6-B6aJjFCqa95dA5Gg","utm_content":"292372853","utm_source":"hs_automation"},"isHubSpotCmsGeneratedPage":true,"canonicalUrl":"https://blog.aquasec.com","contentType":"listing-page","hutk":"9bbfbe8dfc2ce0778bf5539720b34fed","__hsfp":2032787945,"__hssc":"207889101.1.1706870601700","__hstc":"207889101.9bbfbe8dfc2ce0778bf5539720b34fed.1706870601699.1706870601699.1706870601699.1","formTarget":"#hs_form_target_module_14617475123031299_1202","formInstanceId":"1202","pageName":"Cloud native applications security","rumScriptExecuteTime":1008.8999996185303,"rumTotalRequestTime":1260.1000003814697,"rumTotalRenderTime":1280.6000003814697,"rumServiceResponseTime":251.20000076293945,"rumFormRenderTime":20.5,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1706870601707,"originalEmbedContext":{"portalId":"1665891","formId":"fc3a461b-474b-4bd2-b409-c41d4ec09d8a","region":"na1","target":"#hs_form_target_module_14617475123031299_1202","isBuilder":false,"isTestPage":false,"isPreview":false,"formInstanceId":"1202","formsBaseUrl":"/_hcms/forms","css":"","inlineMessage":"Thanks for Subscribing!","isMobileResponsive":true,"pageName":"Cloud native applications security","pageId":"3657573699","contentType":"listing-page","formData":{"cssClass":"hs-form stacked"},"isCMSModuleEmbed":true},"correlationId":"5887a9aa-1b77-4918-8267-669f2d9ce443","renderedFieldsIds":["email","blog_default_hubspot_blog_subscription","utm_source","utm_campaign","utm_medium","utm_content","utm_term"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4638","sourceName":"forms-embed","sourceVersion":"1.4638","sourceVersionMajor":"1","sourceVersionMinor":"4638","allPageIds":{"embedContextPageId":"3657573699","analyticsPageId":"3657573699","contentPageId":0,"contentAnalyticsPageId":"3657573699"},"_debug_embedLogLines":[{"clientTimestamp":1706870599995,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Cloud native applications security\",\"pageUrl\":\"https://blog.aquasec.com/?utm_campaign=Friday%20Light&utm_medium=email&_hsmi=292372853&_hsenc=p2ANqtz-_j8zVMEl5gXUoQW3xHY4ZOlF_5fTrR7RELgpxxdqd77fVFGAGBtp8k3k-MMtmGkU6XBUEeO-hA6-B6aJjFCqa95dA5Gg&utm_content=292372853&utm_source=hs_automation\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36\",\"urlParams\":{\"utm_campaign\":\"Friday Light\",\"utm_medium\":\"email\",\"_hsmi\":\"292372853\",\"_hsenc\":\"p2ANqtz-_j8zVMEl5gXUoQW3xHY4ZOlF_5fTrR7RELgpxxdqd77fVFGAGBtp8k3k-MMtmGkU6XBUEeO-hA6-B6aJjFCqa95dA5Gg\",\"utm_content\":\"292372853\",\"utm_source\":\"hs_automation\"},\"pageId\":\"3657573699\",\"contentAnalyticsPageId\":\"3657573699\",\"contentPageId\":0,\"isHubSpotCmsGeneratedPage\":true}"},{"clientTimestamp":1706870599996,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"NO\""},{"clientTimestamp":1706870601704,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"9bbfbe8dfc2ce0778bf5539720b34fed\",\"canonicalUrl\":\"https://blog.aquasec.com\",\"contentType\":\"listing-page\",\"pageId\":\"3657573699\"}"}]}"><iframe
name="target_iframe_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1202" style="display: none;"></iframe>
</form>
Text Content
Aqua uses website cookies to give visitors a better service. To find out more about the cookies we use, see our Privacy Policy Accept Decline Aqua Security * Products * Solutions * Resources * Company Search Sign In Try Aqua Aqua Blog Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance MITIGATING LEAKY VESSELS VULNERABILITIES IN RUNC, BUILDKIT AND MOBY WITH AQUA Aqua Nautilus Security Research Team February 01, 2024 On January 31, 2024, researchers revealed the discovery of four severe security vulnerabilities in the container ecosystem. These vulnerabilities, affecting key components including runc, BuildKit, Moby (Docker Engine), and Docker Desktop, pose significant risks to the security and integrity of applications that use … Continue reading › HEADCRAB 2.0: EVOLVING THREAT IN REDIS MALWARE LANDSCAPE Asaf Eitani Nitzan Yaakov January 29, 2024 At the beginning of 2023, Aqua Nautilus researchers uncovered HeadCrab - an advanced threat actor utilizing a state-of-the-art, custom-made malware that compromised 1,200 Redis servers. As you know in the ever-evolving world of cybersecurity, threat actors continually adapt and refine their techniques. Recently, our … Continue reading › THE GAPS IN OPEN SOURCE GOVERNANCE THAT THREATEN THE SOFTWARE SUPPLY CHAIN Mor Weinberger Naor Talmor January 23, 2024 The widespread issue of unmaintained and deprecated npm packages recently discovered by Aqua researchers affects more than a fifth of open source packages. Presenting yet another silent example of hidden threats to the software supply chain, it demonstrates how poor operational and structural integrity of dependencies … Continue reading › DECEPTIVE DEPRECATION: THE TRUTH ABOUT NPM DEPRECATED PACKAGES Ilay Goldman Yakir Kadkoda January 18, 2024 Researchers at Aqua Nautilus found that 8.2% percent of the most downloaded npm packages are officially deprecated, but due to inconsistent practices in handling package dependencies, the real number is much larger, closer to 21.2%. Moreover, some package maintainers, when confronted with security flaws, deprecate … Continue reading › APACHE APPLICATIONS TARGETED BY STEALTHY ATTACKER Nitzan Yaakov Assaf Morag January 08, 2024 Researchers at Aqua Nautilus have uncovered a new attack targeting Apache Hadoop and Flink applications. This attack is particularly intriguing due to the attacker's use of packers and rootkits to conceal the malware. The simplicity with which these techniques are employed presents a significant challenge to … Continue reading › 2024 CYBERSECURITY TRENDS: AI, CLOUD, AND THREAT INTELLIGENCE Aqua Nautilus Security Research Team January 04, 2024 As we begin this new year, we see the landscape of cybersecurity poised to witness a surge in AI-driven attacks, propelling the industry into a rapid cycle of innovation. Defenders are on a quest to develop advanced AI-based security measures, not just to detect and respond to threats in real-time, but to predict and … Continue reading › THE TX-RAMP CERTIFICATION: A VITAL CREDENTIAL FOR AQUA SECURITY Youssef Takhssaiti January 02, 2024 In today's digital age, data security is important. With organizations increasingly migrating their operations to the cloud, the need for robust cloud security solutions has never been greater. One significant credential that stands out in the realm of cloud security is the TX-RAMP (Texas Risk Assessment and … Continue reading › ELECTION DYNAMICS: PREDICTIONS FOR THE U.S. FEDERAL GOVERNMENT Youssef Takhssaiti December 27, 2023 As we approach 2024, the U.S. Federal Government stands at a critical juncture in cybersecurity. With the backdrop of an election year, emerging technological trends, and evolving cyber threats, it’s essential to anticipate the challenges and opportunities that lie ahead. Drawing from insights of recent expert … Continue reading › THE EVOLVING LANDSCAPE OF CLOUD SECURITY: OUR PREDICTIONS FOR 2024 Michal Lewy Harush December 19, 2023 In the ever-shifting realm of cybersecurity, where innovation and uncertainty intertwine, the year 2023 has been nothing short of chaos. As the dark underbelly of AI-powered threats surfaces, and court rulings redefine the consequences of security failures, the security industry stands at a pivotal juncture. CISOs … Continue reading › LASTING LEGACY OF LOG4J: LESSONS FOR RUNTIME SECURITY Erin Stephan December 13, 2023 Another December is upon us, stores are full of shoppers, lights are illuminating cities, towns and cul-de-sacs as radio stations bombard listeners with the continuous rotation of holiday music. Yet amongst all this merriment sits the IT security professional behind their screen completing their end of year tasks. … Continue reading › QUANTIFYING THE BUSINESS VALUE OF CNAPP: TOTAL ECONOMIC IMPACT STUDY Erin Stephan December 06, 2023 Businesses have been embracing cloud native technologies because of their elasticity and flexibility. They allow enterprises to quickly scale and develop applications that are built with services packaged in containers, deployed as microservices and managed on elastic infrastructure through agile DevOps processes and … Continue reading › All posts Next → SUBSCRIBE TO EMAIL UPDATES Email Address* Notification Frequency UTM_Source UTM_Campaign UTM_Medium UTM_Content UTM_Term POPULAR POSTS * Kubernetes Exposed: One Yaml away from Disaster * The Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secrets * Looney Tunables Vulnerability Exploited by Kinsing * 50 Shades of Vulnerabilities: Uncovering Flaws in Open-Source Vulnerability Disclosures * PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks FILTER BY TOPIC * Container Security (111) * Kubernetes Security (96) * Security Threats (96) * Cloud Native Security (82) * Image Vulnerability Scanning (49) * Aqua Open Source (47) * AWS Security (36) * Docker Security (35) * Runtime Security (35) * Aqua Security (34) * Vulnerability Management (34) * Software Supply Chain Security (28) * CSPM (27) * Cloud compliance (24) * Container Vulnerability (24) * DevSecOps (24) * CI/CD (17) * CNAPP (17) * Supply Chain Attacks (13) * Secrets (12) * Application Security (11) * Serverless-Security (11) * Kubernetes (10) * ebpf (10) * Host Security (9) * Advanced malware protection (8) * Cloud security conferences (8) * Fargate (8) * Malware Attacks (8) * Cloud Workload Protection Platform CWPP (7) * Hybrid Cloud Security (7) * Attack Vector (6) * Container platforms (6) * Google cloud security (6) * OpenShift (6) * SBOMs (6) * Secure VM (6) * Security Policy (6) * Cloud security (5) * Infrastructure-as-Code (IaC) (5) * Security Automation (5) * Windows Containers (5) * Azure security (4) * Docker containers (4) * Kubernetes RBAC (4) * Service Mesh (4) * Container Deployment (3) * IBM Cloud (3) * Microservices (3) * Nano-Segmentation (3) * Agentless Security (2) * FaaS (2) * Network Firewall (2) * VMware Tanzu (2) * code security (2) * Advanced Threat Mitigation (1) * Cloud VM (1) * Drift Prevention (1) * Kubernetes Authorization (1) * Network (1) * shift Left security (1) Show more... Aqua Container Security Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and accelerate their digital transformations. The Aqua Platform is the leading Cloud Native Application Protection Platform (CNAPP) and provides prevention, detection, and response automation across the entire application lifecycle to secure the supply chain, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions and cloud VMs. Copyright © 2023 Aqua Security Software Ltd. Use Cases * Automate DevSecOps * Modernize Security * Compliance and Auditing * Serverless Containers & Functions * Hybrid and Multi Cloud Environments * Kubernetes Security * OpenShift Security * Docker Security * AWS Cloud Security * Azure Cloud Security * Google Cloud Security * VMware PKS Security Contact Us * Contact Us * Contact Support Products * Aqua Cloud native security * Open Source Container Security * Platform Integrations Resources * Live Webinars * O’Reilly Book: Kubernetes Security * Cloud native Wiki About Us * About Aqua * Newsroom * Careers Runtime security for cloud native environments Webinar series Sign up now 🡲 Subscribe to the blog Get the latest cloud native insights from our experts! email address Sign Up Thank you!