Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
The Nightmare Before Christmas: Looking Back at Log4j Vulnerabilities

The Nightmare Before Christmas: Looking Back at Log4j Vulnerabilities

Last month, a zero-day vulnerability in the extremely popular Log4j logging framework overwhelmed the security community during the already busy end-of-year rush. Just keeping up with Log4j news and updates has been no easy task, let alone fixing the multiple vulnerabilities discovered almost daily. Organizations …

Continue reading ›
Welcome to Aqua’s Open Source Developer Slack Community!

Welcome to Aqua’s Open Source Developer Slack Community!

We’re lucky to have an outstanding open source community with contributors who help us build leading open source cloud native security tools. Over the years, the community has in many ways shaped the direction of what we do. To drive this engagement further, we’re excited to launch our Slack workspace to make it …

Continue reading ›
Looking Ahead: 7 Cloud Native Security Predictions for 2022

Looking Ahead: 7 Cloud Native Security Predictions for 2022

It’s been an incredibly busy year for cloud native and security practitioners! As we wrap up 2021, it’s time to look at what will shape our industry in the year ahead. In that spirit, we asked experts from across the company to share their take on what’s coming next for cloud native security and what to expect in …

Continue reading ›
CVE-2021-44832: New Arbitrary Code Execution Vulnerability in Log4j

CVE-2021-44832: New Arbitrary Code Execution Vulnerability in Log4j

This holiday season, adversaries aren’t taking a vacation, massively exploiting multiple vulnerabilities in Log4j, a highly popular Java logging library. Amid the ongoing efforts of organizations to patch their vulnerable systems, a new Log4j vulnerability, tracked as CVE-2021-44832, has been discovered. It allows for …

Continue reading ›
Threat Alert: Evolving Attack Techniques of Autom Cryptomining Campaign

Threat Alert: Evolving Attack Techniques of Autom Cryptomining Campaign

Over the past three years, we at Team Nautilus have been tracking an ongoing cryptomining campaign attacking our honeypots. It got the name Autom due to a shell script that was downloaded and that initiated the attack. Through the years, the campaign has evolved, demonstrating new techniques to hide the attack. In …

Continue reading ›
Stopping a DreamBus Botnet Attack with Aqua’s CNDR

Stopping a DreamBus Botnet Attack with Aqua’s CNDR

We recently came across a real-life scenario that is very common for organizations. A developer with admin access launched a cloud native application but made a mistake and misconfigured it with weak credentials. Just 12 hours later, the environment was attacked by the DreamBus botnet, which proceeded to evade …

Continue reading ›
Threat Alert: Tracking Real-World Apache Log4j Attacks

Threat Alert: Tracking Real-World Apache Log4j Attacks

This blog was co-authored with Ori Glassman, a security researcher at Aqua Security

Until last week, Log4j was just a popular Java logging framework, one of the numerous components that run in the background of many modern web applications. But since a zero-day vulnerability (CVE-2021-44228) was published, Log4j has …

Continue reading ›
CVE-2021-45046: Second Log4j Security Vulnerability Discovered

CVE-2021-45046: Second Log4j Security Vulnerability Discovered

Dec 17 update: The CVSSv3 score for CVE-2021-45046 has been raised from 3.7 to 9.0.

While many organizations are still dealing with the discovery and mitigation process for the previous Log4j CVE, the project has announced that another vulnerability CVE-2021-45046 has been discovered due to an incomplete fix in Log4j …

Continue reading ›
Protecting Cloud Native Workloads on GKE Autopilot

Protecting Cloud Native Workloads on GKE Autopilot

GKE Autopilot is a new mode of operation in Google Kubernetes Engine (GKE) launched earlier this year to help DevOps teams focus their time and resources on building applications on Kubernetes, rather than on managing the infrastructure that the applications run on. As Aqua Security is a GKE selected security partner, …

Continue reading ›
CVE-2021-44228 aka Log4Shell Vulnerability Explained

CVE-2021-44228 aka Log4Shell Vulnerability Explained

Log4Shell, a new, critical zero-day vulnerability that crashed onto the scene last Friday, shows how issues that are hidden in seemingly basic functionality can have major repercussions for enterprise security. When the dust settles from the immediate incident response and remediation, organizations should assess how …

Continue reading ›
Kubernetes Version 1.23: What's New for Security?

Kubernetes Version 1.23: What's New for Security? 

Like clockwork, a new Kubernetes release is upon us, with loads of interesting new features. A couple of the key features in Kubernetes 1.23 are hitting the beta level and will be enabled by default. In this post, we’ll explain what they mean for security, both in terms of improving cluster security and what you need …

Continue reading ›