Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
04-22-IBM-blog-Run Secure Applications on OpenShift with IBM Power Systemsupdate-image

Run Secure Applications on OpenShift with IBM Power Systems

As an important component of end-to-end application modernization and hybrid cloud adoption, Aqua Security integrates with OpenShift on Power to provide tools to help customers further secure the full lifecycle of Red Hat OpenShift containerized workloads.

Continue reading ›
The New Octocat Coin: How Attackers Bypass CI/CD Compute Limits

The New Octocat Coin: How Attackers Bypass CI/CD Compute Limits

Over the past few years, attackers have embraced cryptomining as a fast revenue source, easily converting compute power into digital coins. Unlike other types of cybercrime, cryptomining is perceived by the attacker as relatively harmless and reversible, with a low footprint and an immediate payoff. Last year, bad …

Continue reading ›
Scan IaC Code in Dev with Trivy’s Extensions for VS Code and JetBrains

Scan IaC Code in Dev with Trivy’s Extensions for VS Code and JetBrains

When developing new software, a key element of improving security is providing security feedback as early and seamlessly as possible. One way to do this is embed security tools directly into the development environment. Recently, Aqua’s open source scanner Trivy has added this functionality, integrating with popular …

Continue reading ›
CVE-2022-0811: CRI-O Vulnerability Could Allow Container Escape

CVE-2022-0811: CRI-O Vulnerability Could Allow Container Escape

A newly discovered vulnerability in the container runtime tool CRI-O could allow for attackers who are able to create pods in a Kubernetes or OpenShift cluster that uses the software, to break out to the underlying cluster node, effectively escalating their privileges. While, as ever, the best way to address this …

Continue reading ›
Cloud Native Technologies Used in Russia-Ukraine Cyber Attacks

Cloud Native Technologies Used in Russia-Ukraine Cyber Attacks

The conflict between Russia and Ukraine is raging not only in the physical realm but also on the cyber front, where governments, hacktivist groups, and individuals are trying to play their part. In this blog, we analyze some examples of the cyberattacks that have taken place as part of the current conflict and review …

Continue reading ›
New Linux Kernel Vulnerability: Escaping Containers by Abusing Cgroups

New Linux Kernel Vulnerability: Escaping Containers by Abusing Cgroups

CVE-2022-0492, a recently disclosed high-severity Linux vulnerability that relates to a weakness in the handling of release_agent in cgroups, could allow for container escape under some circumstances. Fortunately, in common container configurations, the various layers of security hardening will block effective …

Continue reading ›
Dirty Pipe Linux Vulnerability: Overwriting Files in Container Images

Dirty Pipe Linux Vulnerability: Overwriting Files in Container Images

A new CVE in the Linux kernel was released this week. CVE-2022-0847, aka “Dirty Pipe”, is a vulnerability that allows users on a Linux system to overwrite the contents of files that they can read but shouldn’t be able to write to. Looking at this vulnerability from the perspective of hosts using containerization …

Continue reading ›
Russia Cyber Attacks

The Russia-Ukraine Cyber Attacks: A CISO’s Advice

The devastating events in Ukraine have already affected millions of lives and organizations, with profound consequences extending far beyond the region. As the conflict continues to unfold, companies in the US and around the world are facing the growing risk of aggressive Russian cyberattacks. In the face of these …

Continue reading ›
rivilege Escalation from Node/Proxy Rights in Kubernetes RBAC

Privilege Escalation from Node/Proxy Rights in Kubernetes RBAC

One of the side effects of Kubernetes’ rich API and extensive functionality is that sometimes there are security implications to granting users permissions. Security architects should be aware of these side effects when designing platforms that use Kubernetes. In recent research with Iain Smart of NCC Group, we looked …

Continue reading ›
Empowering Developers to Succeed: How and Why I Joined Aqua

Empowering Developers to Succeed: How and Why I Joined Aqua

For the past few years, I’ve been dedicating my career to helping developers improve their skills and discover useful tools and communities. As the industry is moving from customer-driven to community-focused development, Aqua is embracing this shift. I’m excited to take on the role of Aqua’s developer advocate to …

Continue reading ›
Adopting Zero Trust in Kubernetes: The Fundamentals

Adopting Zero Trust in Kubernetes: The Fundamentals

In late January, the White House published a memo that lays the groundwork for creating a zero-trust architecture for federal agencies. With renewed attention from the US government, zero-trust networking is an area that many organizations are focusing on to improve their security posture. With that focus, it makes …

Continue reading ›

Subscribe to Email Updates

Popular Posts

Filter by Topic

Show more...