Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Enhancing UK Cybersecurity and Resilience: Impact of the New National Bill

Enhancing UK Cybersecurity and Resilience: Impact of the New National Bill

As the digital landscape rapidly evolves, the need for a robust, adaptive security strategy becomes increasingly critical. Cyber threats are becoming more sophisticated and widespread, necessitating a proactive approach to cybersecurity. The UK's Cyber Security and Resilience Bill represents a significant stride …

Continue reading ›
5 Must-See Sessions at KubeCon North America

5 Must-See Sessions at KubeCon North America

Who’s getting excited? Next week, the Cloud Native Computing Foundation’s flagship conference, KubeCon + CloudNativeCon, will kick off in Salt Lake City, Utah. In its ninth year, the conference has grown into more than just a technical conference—it’s a vibrant community event that offers attendees the tools, …

Continue reading ›
Threat Alert: TeamTNT’s Docker Gatling Gun Campaign

Threat Alert: TeamTNT’s Docker Gatling Gun Campaign

Long time no see, Aqua Nautilus researchers have identified a new campaign in the making by TeamTNT, a notorious hacking group. In this campaign, TeamTNT appears to be returning to its roots while preparing for a large-scale attack on cloud native environments. The group is currently targeting exposed Docker daemons …

Continue reading ›
AWS CDK Risk: Exploiting a Missing S3 Bucket Allowed Account Takeover

AWS CDK Risk: Exploiting a Missing S3 Bucket Allowed Account Takeover

In June 2024, we uncovered a security issue related to the AWS Cloud Development Kit (CDK), an open-source project.This discovery adds to the six other vulnerabilities we discovered within AWS services. The impact of this issue could, in certain scenarios (outlined in the blog), allow an attacker to gain …

Continue reading ›
Building Success Together: Driving Customer Satisfaction and Growth

Building Success Together: Driving Customer Satisfaction and Growth

Imagine you’ve just onboarded a new cybersecurity partner. After months of careful selection, a significant portion of your security budget, and a considerable investment, you’re confident that this partnership will shield your organization from the relentless and ever-evolving threats that jeopardize your …

Continue reading ›
Walk the Line: High-Fidelity Incident Detection Without Disruption

Walk the Line: High-Fidelity Incident Detection Without Disruption

In the dynamic world of cloud native, security teams are inundated with an overwhelming flood of alerts—far too many for any team to realistically manage. This constant barrage creates a risky dilemma: sift through the noise or silence alerts,risking missing real attacks. Like Johnny Cash’s “Walk the Line,” security

Continue reading ›
perfctl: A Stealthy Malware Targeting Millions of Linux Servers

perfctl: A Stealthy Malware Targeting Millions of Linux Servers

In this blog post, Aqua Nautilus researchers aim to shed light on a Linux malware that, over the past 3-4 years, has actively sought more than 20,000 types of misconfigurations in order to target and exploit Linux servers. If you have a Linux server connected to the internet, you could be at risk. In fact, given the …

Continue reading ›
CUPS: A Critical 9.9 Linux Vulnerability Reviewed

CUPS: A Critical 9.9 Linux Vulnerability Reviewed

In the past couple of days there has been many troubling publications and discussions about a mysterious critical Linux vulnerability allowing remote code execution. While this headline is very alarming, after diving into details there are many preconditions that cool down the level of alertness. Aqua Security …

Continue reading ›
Combatting Phantom Secrets with Historical Secret Scanning

Combatting Phantom Secrets with Historical Secret Scanning

You’ve likely heard of Schrödinger’s Cat from quantum mechanics—both alive and dead until the box is opened. This paradox mirrors a critical risk in modern development: the secrets embedded in your code. You might assume they’re long deleted, but until you examine the depths of commit history, you can’t be certain. …

Continue reading ›
Sink or Swim: Tackling 2024's Record-Breaking Vulnerability Wave

Sink or Swim: Tackling 2024's Record-Breaking Vulnerability Wave

28,821 — that’s the number of vulnerabilities reported last year alone. With over 25,000 CVEs this year so far, 2024 is on track to set an even more troubling record. As cloud native technologies have become the backbone of modern IT infrastructure, these staggering figures highlight a growing and urgent threat. In …

Continue reading ›
Introducing VEX Hub: Essential New Repository Unifying VEX Statements!

Introducing VEX Hub: Essential New Repository Unifying VEX Statements!

VEX (Vulnerability eXploitability Exchange) is an emerging industry standard for communicating the relevance and impact of security vulnerabilities on software artifacts. This approach allows software maintainers to indicate when a specific vulnerability in a software dependency is irrelevant to their software due to …

Continue reading ›