Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Detecting eBPF Malware with Tracee

Detecting eBPF Malware with Tracee

eBPF is a popular and powerful technology embedded in the Linux kernel. It is widely used by many security tools for monitoring kernel activity to detect and protect organizations. eBPF, however, can potentially be a dual edged sword as it can be used by threat actors as part of their malicious arsenal. Lately, we …

Continue reading ›
TeamTNT Reemerged with New Aggressive Cloud Campaign

TeamTNT Reemerged with New Aggressive Cloud Campaign

In part one of this two-part blog series, titled "The Anatomy of Silentbob's Cloud Attack," we provided an overview of the preliminary stages of an aggressive botnet campaign that aimed at cloud native environments. This post will dive into the full extent of the campaign and provide a more comprehensive exploration …

Continue reading ›
From Cloud Security Posture Management to Real-Time CSPM

From Cloud Security Posture Management to Real-Time CSPM

With the growing sophistication of cyber-attacks and increasing complexity of multi-cloud environments, partial visibility alone isn’t enough. Real-Time CSPM improves upon traditional CSPM by bringing deep, real-time context and prioritization to discovered issues. Providing you with complete visibility to reduce the …

Continue reading ›
The Future is CNAPP: Why I Joined Aqua

The Future is CNAPP: Why I Joined Aqua

Why did I join Aqua? Coming from Microsoft Defender, I have witnessed the CNAPP market mature. I’ve seen players of all shapes emerge, and I’ve seen customers come to understand why they need dedicated cloud security. Through all of it Aqua always stood up in my mind as a leader in the cloud security race, and here's …

Continue reading ›
Threat Alert: Anatomy of Silentbob’s Cloud Attack

Threat Alert: Anatomy of Silentbob’s Cloud Attack

Aqua Nautilus researchers identified an infrastructure of a potentially massive campaign against cloud native environments. This infrastructure is in early stages of testing and deployment, and is mainly consistent of an aggressive cloud worm, designed to deploy on exposed JupyterLab and Docker APIs in order to deploy …

Continue reading ›
Introducing KBOM – Kubernetes Bill of Materials

Introducing KBOM – Kubernetes Bill of Materials

SBOM (Software Bill of Materials) is an accepted best practice to map the components and dependencies of your applications in order to better understand your applications’ risks. SBOMs are used as a basis for vulnerability assessment, licensing compliance, and more. There are plenty of available tools, such as Aqua …

Continue reading ›
2023 Nautilus Cyber Security Report - Insights Revealed

2023 Nautilus Cyber Security Report - Insights Revealed

The adoption of cloud native technologies has become a cornerstone to helping businesses build and run applications. Cloud computing has revolutionized the way organizations design, develop, deploy, and manage their applications. While it has brought many benefits such as scalability, flexibility, and agility, it has …

Continue reading ›
GitHub Dataset Research Reveals Millions Potentially Vulnerable to RepoJacking

GitHub Dataset Research Reveals Millions Potentially Vulnerable to RepoJacking

Millions of GitHub repositories are potentially vulnerable to RepoJacking. New research by Aqua Nautilus sheds light on the extent of RepoJacking, which if exploited may lead to code execution on organizations’ internal environments or on their customers’ environments. As part of our research, we found an enormous …

Continue reading ›
The Agent vs Agentless Debate is Over

The Agent vs Agentless Debate is Over

It’s humbling to see customers adopt Aqua’s cloud security vision. It’s humbling to see our predictions come true, doubly so when competitors start to follow us. The proof came over the last few months as cloud visibility vendors either released their own agent or partnered with an agent provider. This validates what …

Continue reading ›
Aqua CNAPP Integrates with Amazon Security Lake

Aqua CNAPP Integrates with Amazon Security Lake

Enabling Customers with Visibility and Remediation at Scale As the pioneer in cloud native security, Aqua has been at the forefront of CNAPP innovation. Today, we are pleased to announce our integration with Amazon Security Lake.  This integration allows customers the insights needed to determine their risk posture …

Continue reading ›
Remediate Vulnerabilities with Integrated Aqua and ServiceNow Workflows

Remediate Vulnerabilities with Integrated Aqua and ServiceNow Workflows

The move to cloud native changed the daily operations of security teams. This shift requires teams to monitor the risk embedded within cloud environments, which increases the noise level, and piles up thousands of security issues to handle. This new reality requires different measures to handle relevant incidents …

Continue reading ›