Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

Cryptocurrency Miners Abusing Containers: Anatomy of an (Attempted) Attack

Cryptocurrency Miners Abusing Containers

This isn't a story about a Docker vulnerability; it's a story about how hackers are looking for unsecured Docker deployments where they can mine cryptocurrency. You shouldn't leave your Docker[…]

Preparing Container-Based Applications for GDPR: What You Need to Know

Preparing Container-Based Applications for GDPR_ What You Need to Know (1)-1.png

The General Data Protection Regulation (GDPR), set to replace the European Data Protection Directive 95/46/EC, comes into effect in May 2018. GDPR is intended to protect the privacy of EU[…]

Which Kubernetes Management Platform is Right for Your Enterprise?

9 Enterprise Kubernetes Management Platforms.png

It is clear that 2017 was the year that Kubernetes underwent explosive growth, emerging as the clear winner in the battle between orchestration tools. In a survey by 451 Research, 71% of IT[…]

eBPF Vulnerability (CVE-2017-16995): When the Doorman Becomes the Backdoor

ebpf vulnerability backdoor

Co-written by Nahman Khayet and Michael Cherny

eBPF Verifier Bypass Vulnerability

Around the last week of December a tweet by Bruce Leidl caught our eyes, since it said “Straight up unlimited R/W[…]

Applying Multiple Security Policies to Images in Your Pipeline to Improve Speed and Efficiency

Applying Multiple Security Policies to Images in Your Pipeline - Blog Banner (1).png

When it comes to securing containerized applications, the first item on everyone’s agenda is to ensure that only trusted images are running in your environment, based on security and compliance[…]

5 Essential Docker Storage Tools

5 Essential Docker Storage Tools

Do Containers Provide Better Protection Against Meltdown and Spectre?

meltdown_bg.png

About Meltdown and Spectre

Following the trend of ‘branding’ vulnerabilities, Meltdown and Spectre vulnerabilities (CVE-2017-5754, CVE-2017-5753, and CVE-2017-5715) are ‘brand’ names given to[…]

Container Events Not to be Missed in 2018

Container Events 2018

The container technology ecosystem is coming of age and with it the number of events across the globe that offer advice, insight, and learning opportunities is rapidly growing as well. To help you[…]

2017 in Review: Major Developments in the Container Ecosystem

2017 container developments

From a “humble” $762 million in 2016, containers are predicted to grow faster than any other technology this year (as well as the next) and are on the way to become a $2.7B industry by 2020.

Grafeas and Image Vulnerability Scanning

Grafeas and Image Vulnerability Scanning

A couple of months ago Aqua Security were part of a group of companies supporting the launch of Grafeas, an open source API initially introduced by Google that allows users to manage and query[…]