blog.aquasec.com Open in urlscan Pro
2606:2c40::c73c:671c  Public Scan

URL: https://blog.aquasec.com/teamtnt-reemerged-with-new-aggressive-cloud-campaign
Submission: On July 14 via api from TR — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://blog.aquasec.com/hs-search-results

<form action="https://blog.aquasec.com/hs-search-results" method="GET">
  <input type="text" class="navbar_search_input" name="term" autocomplete="off" placeholder="Enter a keyword to search the blog">
  <input type="hidden" name="type" value="BLOG_POST">
  <input type="hidden" name="length" value="SHORT">
  <input type="submit" class="navbar_submit_button" value="Search">
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c

<form id="hsForm_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c"
  class="hs-form-private hsForm_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c hs-form-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c hs-form-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_5effc711-9ba3-4d2d-8952-8bff30006758 hs-form stacked"
  target="target_iframe_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" data-instance-id="5effc711-9ba3-4d2d-8952-8bff30006758" data-form-id="bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c" data-portal-id="1665891">
  <div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" class="" placeholder="Enter your First Name"
      for="firstname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112"><span>First Name</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="firstname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" name="firstname" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
  </div>
  <div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field"><label id="label-lastname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" class="" placeholder="Enter your Last Name"
      for="lastname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112"><span>Last Name</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="lastname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" name="lastname" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="family-name" value=""></div>
  </div>
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" class="" placeholder="Enter your Email"
      for="email-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112"><span>Email</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_comment hs-comment hs-fieldtype-textarea field hs-form-field"><label id="label-comment-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" class="" placeholder="Enter your Comment"
      for="comment-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112"><span>Comment</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><textarea id="comment-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" class="hs-input hs-fieldtype-textarea" name="comment" required="" placeholder=""></textarea></div>
  </div>
  <div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_source-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" class="" placeholder="Enter your UTM_Source"
      for="utm_source-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112"><span>UTM_Source</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_source" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_campaign-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" class="" placeholder="Enter your UTM_Campaign"
      for="utm_campaign-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112"><span>UTM_Campaign</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_campaign" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_medium-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" class="" placeholder="Enter your UTM_Medium"
      for="utm_medium-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112"><span>UTM_Medium</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_medium" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_content-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" class="" placeholder="Enter your UTM_Content"
      for="utm_content-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112"><span>UTM_Content</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_content" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_term-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" class="" placeholder="Enter your UTM_Term"
      for="utm_term-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112"><span>UTM_Term</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_term" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_gclid hs-gclid hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-gclid-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" class="" placeholder="Enter your GCLID"
      for="gclid-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112"><span>GCLID</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="gclid" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary" value="Submit Comment"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1689300678284&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1681717672680&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;TeamTNT Reemerged with New Aggressive Cloud Campaign&quot;,&quot;pageUrl&quot;:&quot;https://blog.aquasec.com/teamtnt-reemerged-with-new-aggressive-cloud-campaign&quot;,&quot;pageId&quot;:&quot;123745878136&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://blog.aquasec.com/teamtnt-reemerged-with-new-aggressive-cloud-campaign&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;hutk&quot;:&quot;94ae0fce3f9d515dcb04a18b2cfacff9&quot;,&quot;__hsfp&quot;:2241961375,&quot;__hssc&quot;:&quot;207889101.1.1689300679630&quot;,&quot;__hstc&quot;:&quot;207889101.94ae0fce3f9d515dcb04a18b2cfacff9.1689300679630.1689300679630.1689300679630.1&quot;,&quot;formTarget&quot;:&quot;#hs_form_target_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c&quot;,&quot;formInstanceId&quot;:&quot;7112&quot;,&quot;pageName&quot;:&quot;TeamTNT Reemerged with New Aggressive Cloud Campaign&quot;,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1689300679647,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;1665891&quot;,&quot;formId&quot;:&quot;bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hs_form_target_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;7112&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms&quot;,&quot;css&quot;:&quot;&quot;,&quot;submitButtonClass&quot;:&quot;hs-button primary&quot;,&quot;isMobileResponsive&quot;:true,&quot;pageName&quot;:&quot;TeamTNT Reemerged with New Aggressive Cloud Campaign&quot;,&quot;pageId&quot;:&quot;123745878136&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;isCMSModuleEmbed&quot;:true,&quot;type&quot;:&quot;BLOG_COMMENT&quot;},&quot;correlationId&quot;:&quot;5effc711-9ba3-4d2d-8952-8bff30006758&quot;,&quot;renderedFieldsIds&quot;:[&quot;firstname&quot;,&quot;lastname&quot;,&quot;email&quot;,&quot;comment&quot;,&quot;utm_source&quot;,&quot;utm_campaign&quot;,&quot;utm_medium&quot;,&quot;utm_content&quot;,&quot;utm_term&quot;,&quot;gclid&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.3372&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.3372&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;3372&quot;,&quot;_debug_allPageIds&quot;:{&quot;embedContextPageId&quot;:&quot;123745878136&quot;,&quot;analyticsPageId&quot;:&quot;123745878136&quot;,&quot;pageContextPageId&quot;:&quot;123745878136&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1689300678531,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved customer callbacks used on embed context: [\&quot;getExtraMetaDataBeforeSubmit\&quot;]&quot;},{&quot;clientTimestamp&quot;:1689300678532,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;TeamTNT Reemerged with New Aggressive Cloud Campaign\&quot;,\&quot;pageUrl\&quot;:\&quot;https://blog.aquasec.com/teamtnt-reemerged-with-new-aggressive-cloud-campaign\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36\&quot;,\&quot;pageId\&quot;:\&quot;123745878136\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1689300678533,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1689300679644,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;94ae0fce3f9d515dcb04a18b2cfacff9\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://blog.aquasec.com/teamtnt-reemerged-with-new-aggressive-cloud-campaign\&quot;,\&quot;contentType\&quot;:\&quot;blog-post\&quot;,\&quot;pageId\&quot;:\&quot;123745878136\&quot;}&quot;}]}"><iframe
    name="target_iframe_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_7112" style="display: none;"></iframe>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/fc3a461b-474b-4bd2-b409-c41d4ec09d8a

<form id="hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/fc3a461b-474b-4bd2-b409-c41d4ec09d8a"
  class="hs-form-private hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a hs-form-fc3a461b-474b-4bd2-b409-c41d4ec09d8a hs-form-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_5628a5b7-e0aa-4338-b634-4067be893eb4 hs-form stacked"
  target="target_iframe_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616" data-instance-id="5628a5b7-e0aa-4338-b634-4067be893eb4" data-form-id="fc3a461b-474b-4bd2-b409-c41d4ec09d8a" data-portal-id="1665891">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616" class="" placeholder="Enter your Email Address" for="email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616"><span>Email
        Address</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_blog_default_hubspot_blog_subscription hs-blog_default_hubspot_blog_subscription hs-fieldtype-radio field hs-form-field" style="display: none;"><label
      id="label-blog_default_hubspot_blog_subscription-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616" class="" placeholder="Enter your Notification Frequency"
      for="blog_default_hubspot_blog_subscription-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616"><span>Notification Frequency</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="blog_default_hubspot_blog_subscription" class="hs-input" type="hidden" value="instant"></div>
  </div>
  <div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_source-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616" class="" placeholder="Enter your UTM_Source"
      for="utm_source-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616"><span>UTM_Source</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_source" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_campaign-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616" class="" placeholder="Enter your UTM_Campaign"
      for="utm_campaign-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616"><span>UTM_Campaign</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_campaign" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_medium-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616" class="" placeholder="Enter your UTM_Medium"
      for="utm_medium-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616"><span>UTM_Medium</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_medium" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_content-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616" class="" placeholder="Enter your UTM_Content"
      for="utm_content-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616"><span>UTM_Content</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_content" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_term-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616" class="" placeholder="Enter your UTM_Term"
      for="utm_term-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616"><span>UTM_Term</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_term" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1689300678284&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1669751364161&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;isLegacyThemeAllowed&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;TeamTNT Reemerged with New Aggressive Cloud Campaign&quot;,&quot;pageUrl&quot;:&quot;https://blog.aquasec.com/teamtnt-reemerged-with-new-aggressive-cloud-campaign&quot;,&quot;pageId&quot;:&quot;123745878136&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://blog.aquasec.com/teamtnt-reemerged-with-new-aggressive-cloud-campaign&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;hutk&quot;:&quot;94ae0fce3f9d515dcb04a18b2cfacff9&quot;,&quot;__hsfp&quot;:2241961375,&quot;__hssc&quot;:&quot;207889101.1.1689300679630&quot;,&quot;__hstc&quot;:&quot;207889101.94ae0fce3f9d515dcb04a18b2cfacff9.1689300679630.1689300679630.1689300679630.1&quot;,&quot;formTarget&quot;:&quot;#hs_form_target_module_14538258496742317_616&quot;,&quot;formInstanceId&quot;:&quot;616&quot;,&quot;pageName&quot;:&quot;TeamTNT Reemerged with New Aggressive Cloud Campaign&quot;,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1689300679643,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;1665891&quot;,&quot;formId&quot;:&quot;fc3a461b-474b-4bd2-b409-c41d4ec09d8a&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hs_form_target_module_14538258496742317_616&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;616&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms&quot;,&quot;css&quot;:&quot;&quot;,&quot;inlineMessage&quot;:&quot;Thanks for Subscribing!&quot;,&quot;isMobileResponsive&quot;:true,&quot;pageName&quot;:&quot;TeamTNT Reemerged with New Aggressive Cloud Campaign&quot;,&quot;pageId&quot;:&quot;123745878136&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked&quot;},&quot;isCMSModuleEmbed&quot;:true},&quot;correlationId&quot;:&quot;5628a5b7-e0aa-4338-b634-4067be893eb4&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;blog_default_hubspot_blog_subscription&quot;,&quot;utm_source&quot;,&quot;utm_campaign&quot;,&quot;utm_medium&quot;,&quot;utm_content&quot;,&quot;utm_term&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.3372&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.3372&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;3372&quot;,&quot;_debug_allPageIds&quot;:{&quot;embedContextPageId&quot;:&quot;123745878136&quot;,&quot;analyticsPageId&quot;:&quot;123745878136&quot;,&quot;pageContextPageId&quot;:&quot;123745878136&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1689300678481,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;TeamTNT Reemerged with New Aggressive Cloud Campaign\&quot;,\&quot;pageUrl\&quot;:\&quot;https://blog.aquasec.com/teamtnt-reemerged-with-new-aggressive-cloud-campaign\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36\&quot;,\&quot;pageId\&quot;:\&quot;123745878136\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1689300678484,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1689300679639,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;94ae0fce3f9d515dcb04a18b2cfacff9\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://blog.aquasec.com/teamtnt-reemerged-with-new-aggressive-cloud-campaign\&quot;,\&quot;contentType\&quot;:\&quot;blog-post\&quot;,\&quot;pageId\&quot;:\&quot;123745878136\&quot;}&quot;}]}"><iframe
    name="target_iframe_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_616" style="display: none;"></iframe>
</form>

Text Content

Aqua uses website cookies to give visitors a better service. To find out more
about the cookies we use, see our Privacy Policy

Accept Decline

Aqua Security
 * Products
 * Solutions
 * Resources
 * Company

Search Sign In Try Aqua

Aqua Blog



Ofek Itach Assaf Morag
July 13, 2023


TEAMTNT REEMERGED WITH NEW AGGRESSIVE CLOUD CAMPAIGN

In part one of this two-part blog series, titled "The Anatomy of Silentbob's
Cloud Attack," we provided an overview of the preliminary stages of an
aggressive botnet campaign that aimed at cloud native environments. This post
will dive into the full extent of the campaign and provide a more comprehensive
exploration of an extensive botnet infestation campaign.



The botnet run by TeamTNT has set its sights on Docker and Kubernetes
environments, Redis servers, Postgres databases, Hadoop clusters, Tomcat and
Nginx servers, Weave Scope, SSH, and Jupyter applications.

During our research, Aqua Nautilus managed to access TeamTNT's Command and
Control (C2) server, a move that enabled us to collect invaluable intelligence
about the victims, the targeted environments, the arsenal at the attacker's
disposal, and the tactics employed in this campaign.  

Based on our research, we have discerned that this botnet perpetually scans the
entirety of the internet. Consequently, every IP address undergoes a scan at
least once every hour. We discovered that the rate of infection is fairly rapid,
with a minimum of two new victims emerging every hour.


THE INFRASTRUCTURE

We recently uncovered an emerging campaign that is targeting exposed Docker APIs
and JupyterLab instances. Upon further investigation of the infrastructure, we
found evidence of a broader campaign orchestrated by TeamTNT. 



 

 

Figure 1 – Interactive attack graph, you can control the attack graph by
choosing specific elements in the attack

The IP address 45[.]9[.]148[.]108 is registered to NiceIT-NL, a company that
provides domain names and web hosting services. In many cases, a single server
is shared by multiple customers, making it challenging to link malicious
activity to a specific entity from an external viewpoint.

However, despite these challenges, we managed to trace a significant amount of
activity related to TeamTNT back to this IP address. 



Figure 2 – Interactive Virus Total graph of the C2 server of TeamTNT

As illustrated in Figure 2 above, the subdomains on the AnonDNS website, are
associated with TeamTNT. They all point to the same cloud native campaign, which
aims to infect systems with their cloud worm.

So far, we have identified the following subdomains involved in this campaign:

http[:]//silentbob[.]anondns[.]net

http[:]//everlost[.]anondns[.]net

http[:]//everfound[.]anondns[.]net

http[:]//ap-northeast-1[.]compute[.]internal[.]anondns[.]net 


The trend in activity strongly suggests that TeamTNT is still in the process of
building, refining, and preparing their campaign.



Figure 3 – DNS queries trend taken from our honeypots

TeamTNT’s toolbox

The following are files that TeamTNT deposited on our diverse array of honeypots
during the execution of their campaign. 

Name 

Type 

MD5 

Description 

priv8.sh 

shell script 

cc61a23b635405c4b2f2f6dd1893ac7b 

changes iptables 

data.sh 

shell script 

5d4f7c74b2d89377a1c0fe1a4db15779 

Discovery tool 

aws.sh 

shell script 

99f0102d673423c920af1abc22f66d4e 

Credentials stealer 

grab.sh 

shell script 

5daace86b5e947e8b87d8a00a11bc3c5 

Credentials stealer 

clean.sh 

shell script 

7044a31e9cd7fdbf10e6beba08c78c6b 

Remove cron, cleans bad tools 

curl.sh 

shell script 

fb88d462dba2d9c51fbbf034d1c28ea6 

Deploys curl to allow downloading payloads 

int.sh 

shell script 

cfb6d7788c94857ac5e9899a70c710b6 

Download tools and deploy backdoors 

pacu.sh 

shell script 

e9be1816a7814acd5fe0b124ecb5bf08 

Deploys Pacu - a Python AWS exploitation package 

scan.sh 

shell script 

c1a0f9d67c47ae5d7a34a63d5f1cf159 

Deploys scanner on infected hosts 

scope.sh 

shell script 

a827e07bd36e1e7c258fb27a18029e7a 

Deploys Weave Scope on infected k8s clusters 

secure.sh 

shell script 

a579ab8b4f5ffc0c1a82ba818621eced 

Deploys various Linux tools 

user.sh 

shell script 

92d6cc158608bcec74cf9856ab6c94e5 

Deploys SSH backdoor 

run.sh 

shell script 

 

Deploys malware and worm 

kube.sh 

shell script 

5dad05ea17d53edb43aa273654db7378 

Secret theft from k8s environments 

kubew.sh 

shell script 

ff43150d9ae2f906be4ac3911dd8da0d 

Deploys Gsocket backdoor 

ngrok.sh 

shell script 

f3d2a7861b25cb92541c066650ddee3f 

Deploys Ngrok backdoor 

b.sh 

shell script 

f60b75ddeaf9703277bb2dc36c0f114b 

Contains various other scripts to deploy malware and backdoors 

gscat.sh 

shell script 

f474ef57b8d4c767273927120e1c9b90 

Deploys Gsocket backdoor 

x3c.sh 

shell script 

92307435bfac8498bc03fd9370c9d1cd 

Deploys cryptominer and rootkit to hide it 

tmate.sh 

shell script 

f13b8eedde794e2a9a1e87c3a2b79bf4 

Deploys a backdoor 

aws.meta.sh 

shell script 

575ca10c3fb2adeb766cae815090f5ef 

Stealing AWS credentials by exploiting the meta-data server 

peirates.sh 

shell script 

519f86ac6c71c736fdadbb7ff37b6c2d 

A k8s pen test tool 

gscat.php 

php script 

3da71d66e91ebe0876d2fa451fe27e95 

Deploys Gsocket backdoor 

a 

binary 

87c8423e0815d6467656093bff9aa193 

Tsunami malware 

zgrab 

binary 

26c8f6597826fbdebb5df4cd8cd34663 

Scanning tool 

scan 

binary 

203fe39ff0e59d683b36d056ad64277b 

Scanning tool 

chmod 

binary 

c77cbb5879170acbf6018ee2e141cc7e 

Linux tool 

charattr 

binary 

2044446e6832577a262070806e9bf22c 

Linux tool 

xmrig 

binary 

4dc1884527550dc27bd5dfc54b9ae433 

Cryptominer 

ngrok 

binary 

cc7f8017eebb512b17aa08d09b45b3e9 

Linux tool 

tmate 

binary 

4061502ba7be7db37d0cd9bc224b1027 

Linux tool - allow opening backdoors 

1.0.4.tar.gz 

TAR file 

b66fe14854d5c569a79f7b3df93d3191 

TAR file - contains masscan 

Mind that all the above mentioned artifacts were uploaded to VirusTotal.  

The targeted environments

The following are the targeted environments as identified in the scripts, as
well as from observed attacks against our honeypots and actual organizations: 

Name 

Description 

Kubernetes clusters 

TeamTNT is looking for misconfigured API servers, etcd and kubelet APIs, trying
to extract secrets from the API server, list the content of etcd and list
running pods via kubelet API. 

Docker API 

TeamTNT is looking for misconfigured Docker API that allows access and code
execution to everyone. They are often running malicious containers they host on
Docker Hub or vanilla containers such as alpine:latest and add malicious
commands 

Weave Scope 

TeamTNT is looking for Weave scope instances with no authentication and exploit
these k8s dashboards to get shell access and run malicious code 

JupyterLab and Jupyter Notebook 

TeamTNT is looking for Juypter (lab and notebook) instances with no
authentication and exploit these services to get shell access and run malicious
code 

Redis servers 

We’ve seen indications in the IRC channel that Redis servers were infected,
we’re not sure regarding this attack vector by TeamTNT. In general, exposed
Redis servers can be exploited by various vulnerabilities and misconfigurations 

Hadoop 

We’ve seen actual attacks against Hadoop services. We’re still investigating
this attack vector and aren’t sure how this attack vector is exploited by
TeamTNT. In general, Hadoop clusters can be exploited by various vulnerabilities
and misconfigurations 

We also saw some tests made with various vulnerabilities and misconfigurations
in applications and environments such as Tomcat, Nginx, add ssh access.

Exploiting public container registries to deploy malware

TeamTNT is recognized for utilizing Docker Hub's public registry to distribute
their malware. Our Team Nautilus frequently reports to Docker Hub about
malicious activities occurring on their public registry. The following container
images were used in this current campaign: 

Name 

Description 

shanidmk/jltest2:latest 

Scan for Jupyter Lab instances 

shanidmk/jltest:latest 

Stores a compiled Zgrab 

shanidmk/sysapp:latest 

Docker scan and infect with Tsunami malware and cryptominer 

shanidmk/blob:latest 

Docker scan and infect with Tsunami malware and cryptominer 

524470869/dasd:latest 

Docker scan and infect with Tsunami malware and cryptominer 

524470869/dscan:latest 

Docker scan and infect with Tsunami malware and cryptominer 

We notified Docker Hub about these malicious users and container images.

The scanning mechanism

Each target in this campaign is infected with malware and runs a worm script
that operates in three stages:

 1. Scanning the internet for potential victims.
 2. Infecting the newly identified victims with the malware and worm (example
    can be seen in the technique section below).
 3. Reporting back to the Command and Control (C2) server about the compromised
    victims. Figure 4 – Scanning operation of TeamTNT’s botnet.

 



Figure 4 – Scanning operation of TeamTNT’s botnet 

This botnet is notably aggressive, rapidly proliferating across the cloud and
targeting a wide array of services and applications within the Software
Development Life Cycle (SDLC). It operates at an impressive speed, demonstrating
remarkable scanning capability.

The botnet is designed to communicate with a central C2 server to determine the
next range of IP addresses to scan. Each compromised system, or 'victim',
involved in scanning the internet, queries the C2 server to receive a number
between 1 and 255. This number corresponds to the first octet of the IP range in
a /8 CIDR block, which encompasses approximately 17 million IP addresses.

In our experiment, we observed that each number (1-255) in the first octet is
selected six times per minute. This suggests that for each number in the first
octet, there are six compromised servers scanning the internet for vulnerable
targets every minute.

Using Masscan, a tool renowned for its high-speed scanning capabilities, we
estimate that a /8 CIDR range can be scanned within three minutes for a specific
port. Based on these calculations, we estimate that each IP address is scanned
approximately once every 30 seconds. This level of scanning frequency is truly
remarkable.

To validate our hypothesis, we examined a dedicated honeypot and observed a
significant increase in Docker API scanning activity, while the scanning
frequency of other ports remained consistent. Over a two-week period, we
recorded 440 scans, suggesting that each IP address worldwide is scanned
approximately 1.3 times per hour. Despite being more moderate than some
estimates, this frequency still represents a significant volume of scanning
activity.


IN THE EYE OF A TSUNAMI

Over the years, TeamTNT has consistently used Tsunami malware as part of their
tactics, techniques, and procedures (TTPs), and this campaign is no exception.
Tsunami is a type of malware, specifically a botnet, that primarily targets
Linux systems.

A key feature of Tsunami is its ability to connect to a Command and Control (C2)
server using the Internet Relay Chat (IRC) protocol. This server is used to
control the botnet, issuing commands to the infected systems. The C2 server
operates through IRC channels, functioning like chat rooms on the IRC network.
Each infected system joins a specific channel on the IRC server, where it waits
for commands.

These commands can instruct the botnet to download additional malware or perform
other malicious activities, effectively transforming the infected system into a
backdoor for various nefarious purposes.

Tsunami includes features to maintain its presence on the infected system, such
as hiding its processes and files to avoid detection. It can also automatically
reconnect to the C2 server if the connection is lost, ensuring sustained control
over the compromised system.

By connecting to the IRC channel of TeamTNT's Tsunami malware, one can observe
all the infected machines, the commands sent from the C2, and the targets.

Figure 5 – Screenshot from the IRC channel #AWS used as Command and Control
server

Over a span of 7 days, we observed 196 unique infected hosts. This equates to
~1.3 new victims every hour. Given that this campaign is aggressively scanning
the internet for exposed Docker APIs, Jupyter Lab and Notebook instances, Redis
servers, SSH connections, and Weave Scope applications, it can rapidly infect
new hosts that are exposed even for a brief moment. 




UNDERSTANDING THE TECHNIQUES USED BY TEAMTNT

In the following section, we delve into the various techniques that TeamTNT
employs as part of their campaign.

Initial Access

In figure 6 below, you can see our Honeypots alert system indicates a malicious
container deployed. You can see the vanilla image alpine:latest with a malicious
command, mounting the ‘/host’, decoding (base64) and running an encoded command
and downloading aws.sh script from the C2 server. 




Figure 6: A screenshot taken from our honeypot’s alert system

Execution

In terms of execution and the download command is a bash implementation used to
download scripts and binaries from the C2 server. It receives an address, parses
it, and downloads the available files



Figure 7: Execution examples

Persistence

We’ve seen 4 types of backdoors used by TeamTNT. The first one was by creating a
new account by modifying the passwd, shadow and sudoers files. First the files’
permissions are modified so they can be modified. Next under the use system the
data is inserted or modified.



Figure 8: the make_user_axx() function which creates new users  

The passwd file contains information about the users in the system. Per each
user, the username, password, user ID, group ID, Home directory and command
shell.

The shadow file stores hashed passphrases of the users’ accounts.

The sudoers file stores the system privileges of the users.

In the script above TeamTNT creates or runs over the user ‘system’, it got
listed in the sudoers file with the highest privileges to the system.

Below in figure 9, you can see that TeamTNT is creating an SSH backdoor by
inserting their own RSA key. In addition, they are altering the SSH
configuration to prevent access from known hosts, while making the configuration
more flexible to SSH connection by them. 



Figure 9: the make_user_axx() function which creates new users

Figure 10 below, illustrates a function that is creating a hidden backdoor. This
is very similar to the pervious mechanism in figure 9 above. Here the user is
games. This function also creates an SSH backdoor, allowing TeamTNT backdoor
access to the server via SSH. 



Figure 10: the make_hiden_door() function which creates ssh backdoor

As can be seen in figure 11 below, once the user and password were created, the
access command (with the credentials) is sent to the C2 server of TeamTNT. 



Figure 11: the get_ssh_link() function which reports to TeamTNT about a newly
acquired backdoor

The second one was by using Gsocket, as seen in the execution command in figure
12 below, TeamTNT is using PHP to execute a script that runs on a compromised
server. 



Figure 12: Opening backdoor on attacked server with gscat.php

This is a snippet from the gscat.php script, and as illustrated is set to
download x, which is Gsocket, which is a powerful reverse shell tool that allows
for the creation of secure, always-on, global server sockets. Essentially, it
enables you to create a network socket that is accessible from anywhere on the
internet, bypassing NAT and firewalls by using the Global Socket Relay Network
to route the traffic.



Figure 13: A couple of snippets from the Gsocket infection sctipt

The third backdoor is by using a webshell of tmate[.]io. Tmate is legitimate
software serves as a terminal multiplexer with instant terminal sharing: it
enables a number of terminals to be created, accessed, and controlled from a
single screen and be shared with another mates. In figure 14 below, you can see
how TeamTNT is utilizing this tool as a backdoor. 



Figure 14: Tmate backdoor execution script

The fourth backdoor is by utilizing a socket connected over HTTP service with
Ngrok product.  

Another interesting persistence technique we’ve seen in the campaign is removing
the execution of runc when the initial access is via misconfigured Docker API.
This is a new type of persistence we offer to MITRE, as it didn’t appear in
record. TeanTNT is locking runc, which effectively locks the misconfiguration
and closes the access to the compromised server. They are doing it to prevent
from other campaigns to access the server and remove their attack, hence gaining
persistence to their attack from competing campaigns.



Figure 15: Changing runc so it won’t execute to block exposed Docker API initial
access vector to increase persistence

As can be seen in figure 15 above, TeamTNT delete the malicious container with
which they gained the initial access, thus reducing the chances of detection.
Then they run ‘chmod -x’ on container runtime component, which prevents it from
being executed. Thus, preventing from other attackers to exploit the
misconfiguration of exposed Docker API and blocking the initial access. This
increases the persistence of the attack.

In part 1 of this blog, we reported about TeamTNT’s cloud worm – silent bob. In
one of the containers, TeamTNT used an interesting persistence technique. They
ran the container with the “--restart=always” flag, which means that if for some
reason the container stops it will always attempt restarting, hence creating a
new persistence technique.  



Figure 16: A part of the botnet infection script, containing docker execution
with high privilege and persistence

Privilege escalation

As depicted in figure 16 above, TeamTNT is running the container as a privileged
one, and mounting the host, this enables privileged access to the host.

Defense evasion

In figure 16 above, TeamTNT is using dload() function which is utilizing dev/tcp
to invoke communication and download payloads, instead of using wget or curl
which might be monitored or don’t exist on the machine. This helps them evade
detection.

TeamTNT is using prochider rootkit to hide cryptomining execution. As seen in
figure 17 below, TeamTNT is writing to /tmp/ld.so an SO file which contains
prochider. It is moved to /dev/shm and loaded to ld.preload. This will ensure
the prochider is running and hiding the xmrig in processes whenever the user is
running ps, for instance, to check running processes. 



Figure 17: this function deploys prochider rootkit hidden in ldpreload.

Credential Access

In the script 'grab.sh' depicted in Figure 18 below, you can see the types of
credentials that TeamTNT's scripts are designed to scan for.



Figure 18: Some lists of credential files that TeamTNT is looking to extract
from targeted hosts.

As depicted in Figure 19 below, the 'get_azure()' function is designed to scan
for Azure configuration files, which can include sensitive information such as
secrets and environment data.



Figure 19: the get_azure() function reflects what TeamTNT is looking for in
Azure cloud

As shown in Figure 20 below, the 'get_google()' function is configured to scan
for Google Cloud Platform (GCP) configuration files, which can include sensitive
information such as secrets and environment data. 



Figure 20: the get_google() function reflects what TeamTNT is looking for in GCP

TeamTNT is scanning for credentials across multiple cloud environments,
including AWS, Azure, and GCP. They are not only looking for general credentials
but also specific applications such as Grafana, Kubernetes, Docker Compose, Git
access, and NPM. Additionally, they are searching for databases and storage
systems such as Postgres, AWS S3, Filezilla, and SQLite. They are also targeting
more unique systems such as ngrok data, Samba, Censys, and others. This
indicates that TeamTNT has evolved alongside the industry, shifting from solely
targeting containers (as seen in 2019) to becoming a threat actor that targets
cloud native applications. As the attack surface expands, they are leveraging
the expertise they've gained in the cloud over the past few years to gain
initial access, move laterally across the cloud, and deploy backdoors and
further malware for their benefit.

From k8s clusters, TeamTNT is collecting cluster secrets with the function
illustrated in figure 21 below: 



Figure 21: k8s environment and secrets searched by TeamTNT

With the curl command, using the token, TeamTNT is calling the secrets via the
API server. With the second function TeamTNT is collecting further information
about the environment, such as pods, deployments, secrets and daemonsets.

Discovery

The env_aws() function is used to connect to AWS meta-data server to collect
sensitive infotmation about the account, such as keys, secrets, IAM roles etc.



Figure 22: the envaws() function reflects what TeamTNT is looking for in AWS

The next 3 functions are very interesting. TeamTNT is collecting information
about AWS, Azure, Kubernetes and running containers from running containers,
processes and AWS configuration files. 



Figure 23: further credentials sought by TeamTNT 
Downloading ‘kubectl’ tool to better query the k8s cluster. 




Figure 24: downloading kubectl tool to better explore k8s environments

As seen in figure 25 below, TeamTNT is running 2 functions to discover the k8s
environment, more specifically the sysvars and namespaces. 



Figure 25: further discovery of k8s environments

As depicted in figure 26 and 27 below, TeamTNT is running in pacu.sh, a pip
install command to install Pacu Python package. In the second figure you can see
the configuration of what TeamTNT is looking for. They are after various AWS
services, including EC2, Glue, Lambdas, and Lightsail, which is a virtual
private server (VPS) provider and is the easiest way to get started with AWS for
developers, small businesses, students, and other users who need a solution to
build and host their applications on cloud. In the past it was reported as an
interesting attack vector, since it is aimed for less proficient practitioners,
thus more susceptible to misconfigurations. 



Figure 26: Pacu package on Pypi 



Figure 27: Pacu configuration file

Command and Control

TeamTNT is using Tsunami malware, as explained above, this is done by deploying
and executing ELF files (a, system, systems). In figure 28 below you can see
command execution via IRC channel. 



Figure 28: IRC commands passed to infected hosts


IMPACT OF TEAMTNT ON THE SOFTWARE DEVELOPMENT LIFE CYCLE

TeamTNT doesn't directly compromise the code creation phase. However, their
actions can indirectly impact code security. By targeting source code management
applications such as GitHub they can impact organizations code, and even open a
supply chain attack vector.  

In the same manner TeamTNT can affect the CI/CD and Build processes by
compromising GitHub or NPM. In addition, they are extensively scanning for
misconfigured Kubernetes (k8s) clusters, Docker API, and Weave Scope. They can
attack any of these stages: development, staging and production environments and
compromise any of them. By exploiting misconfigurations in these components, or
stealing artifact registries secrets, they can gain unauthorized access to the
CI/CD pipeline infrastructure, potentially compromising the build process,
injecting malicious code, or tampering with build artifacts. This can lead to
the deployment of compromised or vulnerable applications into the runtime
environment.

In the runtime phase, TeamTNT targets cloud native environments and cloud
service providers. As mentioned above, they extensively seek for
misconfigurations in Docker and K8s environments, and they seek unauthorized
access to data and secrets stored in services such as Glue, S3 buckets, and
Lambdas. By compromising these resources, they can potentially gain access to
sensitive data, manipulate runtime configurations, or disrupt the normal
operation of the applications.  


ATTRIBUTING THIS CAMPAIGN TO TEAMTNT

The infrastructure in question shares significant similarities with previous
campaigns attributed to TeamTNT, including the same coding style, similar
infrastructure choices, targeting similar systems, and employing comparable
tools and coding conventions. However, the focus this time seems to be more on
infecting systems and testing the botnet, rather than deploying cryptominers for
profit.  

TeamTNT was known for its unique approach, often communicating with researchers
through ASCII art, Twitter, and embedded messages in their code and malware.
However, in this latest round of activity, after seemingly coming out of
retirement, they have become noticeably less communicative.  

 

OFEK ITACH

Ofek is a Security Researcher at Team Nautilus, Aqua's research team. With a
focus on big data analytics, Ofek researches various domains in the cloud,
including attacks against cloud providers and services. In his spare time, he
enjoys listening to podcasts, playing soccer, and collecting watches.

ASSAF MORAG

Assaf is a Lead Data Analyst at Aqua Nautilus research team, he focuses on
supporting the data needs of the team, obtaining threat intelligence and helping
Aqua and the industry stay at the forefront of new threats and methodologies for
protection. His work has been published in leading info security publications
and journals across the globe, and most recently he contributed to the new MITRE
ATT&CK Container Framework.

Security Threats

READ MORE



First Name

Last Name

Email*

Comment*

UTM_Source

UTM_Campaign

UTM_Medium

UTM_Content

UTM_Term

GCLID





SUBSCRIBE TO EMAIL UPDATES

Email Address*

Notification Frequency

UTM_Source

UTM_Campaign

UTM_Medium

UTM_Content

UTM_Term




POPULAR POSTS

 * A Brief History of Containers: From the 1970s Till Now
 * Top 20 Docker Security Best Practices: Ultimate Guide
 * Protecting Kubernetes Secrets: A Practical Guide
 * Which Kubernetes Management Platform is Right for You?
 * Threat Alert: Kinsing Malware Attacks Targeting Container Environments


FILTER BY TOPIC

 * Container Security (110)
 * Kubernetes Security (93)
 * Cloud Native Security (81)
 * Security Threats (80)
 * Image Vulnerability Scanning (49)
 * Aqua Open Source (47)
 * AWS Security (35)
 * Docker Security (35)
 * Runtime Security (35)
 * Vulnerability Management (34)
 * Software Supply Chain Security (25)
 * CSPM (24)
 * Cloud compliance (24)
 * Container Vulnerability (24)
 * DevSecOps (23)
 * Aqua Security (17)
 * CI/CD (17)
 * CNAPP (16)
 * Secrets (12)
 * Supply Chain Attacks (12)
 * Application Security (11)
 * Serverless-Security (11)
 * ebpf (10)
 * Host Security (9)
 * Advanced malware protection (8)
 * Cloud security conferences (8)
 * Fargate (8)
 * Kubernetes (8)
 * Cloud Workload Protection Platform CWPP (7)
 * Hybrid Cloud Security (7)
 * Malware Attacks (7)
 * Attack Vector (6)
 * Container platforms (6)
 * Google cloud security (6)
 * OpenShift (6)
 * SBOMs (6)
 * Secure VM (6)
 * Security Policy (6)
 * Infrastructure-as-Code (IaC) (5)
 * Security Automation (5)
 * Windows Containers (5)
 * Azure security (4)
 * Cloud security (4)
 * Docker containers (4)
 * Kubernetes RBAC (4)
 * Service Mesh (4)
 * Container Deployment (3)
 * IBM Cloud (3)
 * Microservices (3)
 * Nano-Segmentation (3)
 * Agentless Security (2)
 * FaaS (2)
 * Network Firewall (2)
 * VMware Tanzu (2)
 * code security (2)
 * Advanced Threat Mitigation (1)
 * Cloud VM (1)
 * Drift Prevention (1)
 * Kubernetes Authorization (1)
 * Network (1)
 * shift Left security (1)

Show more...
Aqua Container Security

Aqua Security is the largest pure-play cloud native security company, providing
customers the freedom to innovate and accelerate their digital transformations.
The Aqua Platform is the leading Cloud Native Application Protection Platform
(CNAPP) and provides prevention, detection, and response automation across the
entire application lifecycle to secure the supply chain, secure cloud
infrastructure and secure running workloads wherever they are deployed.

Aqua customers are among the world’s largest enterprises in financial services,
software, media, manufacturing and retail, with implementations across a broad
range of cloud providers and modern technology stacks spanning containers,
serverless functions and cloud VMs.


Copyright © 2023 Aqua Security Software Ltd.
Use Cases
 * Automate DevSecOps
 * Modernize Security
 * Compliance and Auditing
 * Serverless Containers & Functions
 * Hybrid and Multi Cloud

Environments
 * Kubernetes Security
 * OpenShift Security
 * Docker Security
 * AWS Cloud Security
 * Azure Cloud Security
 * Google Cloud Security
 * VMware PKS Security

Contact Us
 * Contact Us
 * Contact Support

Products
 * Aqua Cloud native security
 * Open Source Container Security
 * Platform Integrations

Resources
 * Live Webinars
 * O’Reilly Book: Kubernetes Security
 * Cloud native Wiki

About Us
 * About Aqua
 * Newsroom
 * Careers








The Agent vs Agentless Debate is Over!

Read More
Subscribe to the blog
Get the latest cloud native insights from our experts!
email address
Sign Up
Thank you!