Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Lucifer DDoS botnet Malware is Targeting Apache Big-Data Stack

Lucifer DDoS botnet Malware is Targeting Apache Big-Data Stack

Aqua Nautilus has unveiled a new campaign targeting Apache big-data stack, specifically Apache Hadoop and Apache Druid. Upon investigation, it was discovered that the attacker exploits existing misconfigurations and vulnerabilities within our Apache cloud honeypots to execute the attacks.

Continue reading ›
Snap Trap: The Hidden Dangers Within Ubuntu's Package Suggestion System

Snap Trap: The Hidden Dangers Within Ubuntu's Package Suggestion System

Aqua Nautilus researchers have identified a security issue that arises from the interaction between Ubuntu's command-not-found package and the snap package repository. While command-not-found serves as a convenient tool for suggesting installations for uninstalled commands, it can be inadvertently manipulated by …

Continue reading ›
Unleashing Scale for Hybrid Cloud: Aqua to Protect Containerized Environments on LinuxONE 4 Express

Unleashing Scale for Hybrid Cloud: Aqua to Protect Containerized Environments on LinuxONE 4 Express

We are excited to announce the upcoming support of the Aqua Cloud Native Application Platform (CNAPP) on IBM Z and LinuxONE, alongside IBM’s unveiling of its new LinuxONE 4 Express system. Support of the Aqua Cloud Native Application Platform (CNAPP) on IBM Z and LinuxONE will be available in 1Q 2024. 

Continue reading ›
Mitigating Leaky Vessels Vulnerabilities in runc, BuildKit and Moby with Aqua

Mitigating Leaky Vessels Vulnerabilities in runc, BuildKit and Moby with Aqua

On January 31, 2024, researchers revealed the discovery of four severe security vulnerabilities in the container ecosystem. These vulnerabilities, affecting key components including runc, BuildKit, Moby (Docker Engine), and Docker Desktop, pose significant risks to the security and integrity of applications that use …

Continue reading ›
HeadCrab 2.0: Evolving Threat in Redis Malware Landscape

HeadCrab 2.0: Evolving Threat in Redis Malware Landscape

At the beginning of 2023, Aqua Nautilus researchers uncovered HeadCrab - an advanced threat actor utilizing a state-of-the-art, custom-made malware that compromised 1,200 Redis servers. As you know in the ever-evolving world of cybersecurity, threat actors continually adapt and refine their techniques. Recently, our …

Continue reading ›
The Gaps in Open Source Governance That Threaten the Software Supply Chain

The Gaps in Open Source Governance That Threaten the Software Supply Chain

The widespread issue of unmaintained and deprecated npm packages recently discovered by Aqua researchers affects more than a fifth of open source packages. Presenting yet another silent example of hidden threats to the software supply chain, it demonstrates how poor operational and structural integrity of dependencies …

Continue reading ›
Deceptive Deprecation: The Truth About npm Deprecated Packages

Deceptive Deprecation: The Truth About npm Deprecated Packages

Researchers at Aqua Nautilus found that 8.2% percent of the most downloaded npm packages are officially deprecated, but due to inconsistent practices in handling package dependencies, the real number is much larger, closer to 21.2%. Moreover, some package maintainers, when confronted with security flaws, deprecate …

Continue reading ›
Apache Applications Targeted by Stealthy Attacker

Apache Applications Targeted by Stealthy Attacker

Researchers at Aqua Nautilus have uncovered a new attack targeting Apache Hadoop and Flink applications. This attack is particularly intriguing due to the attacker's use of packers and rootkits to conceal the malware. The simplicity with which these techniques are employed presents a significant challenge to …
Continue reading ›
2024 Cybersecurity Trends: AI, Cloud, and Threat Intelligence

2024 Cybersecurity Trends: AI, Cloud, and Threat Intelligence

As we begin this new year, we see the landscape of cybersecurity poised to witness a surge in AI-driven attacks, propelling the industry into a rapid cycle of innovation. Defenders are on a quest to develop advanced AI-based security measures, not just to detect and respond to threats in real-time, but to predict and …

Continue reading ›
The TX-RAMP Certification: A Vital Credential for Aqua Security

The TX-RAMP Certification: A Vital Credential for Aqua Security

In today's digital age, data security is important. With organizations increasingly migrating their operations to the cloud, the need for robust cloud security solutions has never been greater. One significant credential that stands out in the realm of cloud security is the TX-RAMP (Texas Risk Assessment and …

Continue reading ›
Election Dynamics: Predictions for the U.S. Federal Government

Election Dynamics: Predictions for the U.S. Federal Government

As we approach 2024, the U.S. Federal Government stands at a critical juncture in cybersecurity. With the backdrop of an election year, emerging technological trends, and evolving cyber threats, it’s essential to anticipate the challenges and opportunities that lie ahead. Drawing from insights of recent expert …

Continue reading ›