Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Follow Up on the 2019 Aqua Hacktoberfest Challenge

Follow Up on the 2019 Aqua Hacktoberfest Challenge

Last month, we announced aqua's Hacktoberfest challenge: Calling to contribute to any of our open-source projects during the month of October and win prizes! In this post, we’d like to share the results and provide instructions on how you can claim your rewards.

Continue reading ›
Optimized Logging for Container Workloads Using AWS FireLens

Optimized Logging for Container Workloads Using AWS FireLens

Managing a growing number of systems and applications can be complicated and time consuming, making it particularly important to find a way to centralize and optimize your data. As a result, AWS has recently released FireLens which, working with Fluentd and Fluent Bit, allows you to route your logs to a large number …

Continue reading ›
Cloud VM Security with Aqua CSP

Cloud VM Security with Aqua CSP

We have enhanced our Cloud Native Security Platform (CSP) by adding Cloud VM protection capabilities for VMs that are not running container workloads. Aqua now provides a full-stack security solution across all workload types: VMs, containers, and serverless functions, for both Linux and Windows VMs.

Continue reading ›
CVE-2019-14287 sudo Vulnerability Allows Bypass of User Restrictions

CVE-2019-14287 sudo Vulnerability Allows Bypass of User Restrictions

A new vulnerability was discovered earlier this week in the sudo package. Sudo is one of the most powerful and commonly used utilities installed on almost every UNIX and Linux-based operating system.

Continue reading ›
Aqua Celebrates Open Source at Hacktoberfest

Aqua Celebrates Open Source at Hacktoberfest

It’s that time of the year again - for some people October is a month of beer, and for others (like us) it’s hacking time! Hacktoberfest, named after the famous German festival Oktoberfest, is a wonderful initiative that invites developers from around the world to participate and contribute to Open Source. At Aqua, we …

Continue reading ›
DNS Spoofing on Kubernetes Clusters

DNS Spoofing on Kubernetes Clusters

In this post I’ll describe how an attacker, who manages to run malicious code on a cluster can, with no special permissive permissions, successfully spoof DNS responses to all the applications running on the cluster, and from there execute a MITM (Man In The Middle) on all network traffic of pods.

Continue reading ›
Trivy Vulnerability Scanner Joins the Aqua Open-source Family

Trivy Vulnerability Scanner Joins the Aqua Open-source Family

If you’re interested in container image vulnerability scanning, there’s a good chance that you have come across the Trivy open source scanning tool. This project has been receivingravereviewsfor its ease-of-use, as well as its comprehensive vulnerability tracking across both OS packages and language-specific …

Continue reading ›
Kubernetes Pod Escape Using Log Mounts

Kubernetes Pod Escape Using Log Mounts

Kubernetes has many moving parts, and sometimes combining them in certain ways can create unexpected security flaws. In this post you’ll see how a pod running as root and with a mount point to the node’s /var/log directory can expose the entire contents of its host filesystem to any user who has access to its logs. …

Continue reading ›
Native Runtime Protection for Pivotal Cloud Foundry

Native Runtime Protection for Pivotal Cloud Foundry

The Pivotal Application Service (PAS) is a distribution of Cloud Foundry Application Runtime (CFAR), part of the Pivotal Cloud Foundry suite. It is widely used especially among large enterprise organizations. Aqua now provides a full lifecycle solution for Pivotal Application Service workloads, from scanning and …

Continue reading ›
Securing Hybrid Cloud Workloads on Google Anthos

Securing Hybrid Cloud Workloads on Google Anthos

There are major shifts happening around container technology. We have seen ongoing improvements in automation tooling and changes as fully containerized workloads move into production. Companies are often running more than one production Kubernetes cluster at a time. DevOps and operations teams, subsequently, have an …

Continue reading ›
Scanning Image Layers, Prometheus, and Harbor Integrations

Scanning Image Layers, Prometheus, and Harbor Integrations

One of the key challenges in container image scanning is understanding where a vulnerability originated in an image, and who can fix it. Image layers allow us to do that, and Aqua’s scanner now allows us to pinpoint discovered vulnerabilities to a specific layer.

Continue reading ›