Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Phantom Secrets: Undetected Secrets Expose Major Corporations

Phantom Secrets: Undetected Secrets Expose Major Corporations

For years, we’ve been educating developers not to hard-code secrets into their code. Now it turns out that even doing this once might permanently expose that secret, even after its apparent removal – and worse, most secrets scanning methods will miss it. Our research found that almost 18% of secrets might be …

Continue reading ›
Catch Me If You Can: Uncovering Malicious Threats in Container Images

Catch Me If You Can: Uncovering Malicious Threats in Container Images

What do Frank Abagnale Jr., the notorious con artist from "Catch Me If You Can", the Golden Snitch from "Harry Potter," and the Higgs boson from physics have in common? They're all extremely difficult to catch. Whether it's outsmarting the FBI, eluding a Quidditch player, or taking physicists almost 50 years to …

Continue reading ›
Understanding the Importance of Runtime Security

Understanding the Importance of Runtime Security

Gartner has estimated that “90% of global organizations will be running containerized applications in production by 2026—up from 40% in 2021.” 

The inherent benefits of cloud native application development enable developers to introduce new code into the environment at an accelerated rate. However, the dynamic nature …

Continue reading ›
Muhstik Malware Targets Message Queuing Services Applications

Muhstik Malware Targets Message Queuing Services Applications

Aqua Nautilus discovered a new campaign of Muhstik malware targeting message queuing services applications, specifically the Apache RocketMQ platform. Our investigation revealed that the attackers downloaded the known malware Muhstik onto the compromised instances by exploiting a known vulnerability in the platform. …

Continue reading ›
Linguistic Lumberjack: Understanding CVE-2024-4323 in Fluent Bit

Linguistic Lumberjack: Understanding CVE-2024-4323 in Fluent Bit

Linguistic Lumberjack is a new critical severity vulnerability (CVE-2024-4323) that affects Fluent Bit versions 2.0.7 through 3.0.3. The vulnerability involves a memory corruption error, potentially leading to denial of service, information disclosure, or remote code execution. 

Continue reading ›
Employee Personal GitHub Repos Expose Internal Azure and Red Hat Secrets

Employee Personal GitHub Repos Expose Internal Azure and Red Hat Secrets

What happens when employees at some of the world’s largest organizations like Microsoft and RedHat use personal GitHub repos for their side projects? They can unknowingly expose corporate secrets and credentials opening the doors for a security incident. Unfortunately, this isn’t just a hypothetical situation.

Continue reading ›
Elevating AWS Kubernetes Security and Compliance

Elevating AWS Kubernetes Security and Compliance

Amazon Elastic Kubernetes Service (Amazon EKS) streamlines the process of deploying, managing, and scaling Kubernetes clusters on Amazon Web Services (AWS), sparing users the complexities of setting up and maintaining their own Kubernetes control plane. Kubernetes itself is an open-source platform designed to automate …

Continue reading ›
Securing GenAI: Safeguarding LLM-Powered Applications with Aqua

Securing GenAI: Safeguarding LLM-Powered Applications with Aqua

In the rapidly evolving world of artificial intelligence, the rise of Generative AI (GenAI) has sparked a revolution in how we interact with and leverage this technology. GenAI is based on large language models (LLMs) that have demonstrated remarkable capabilities, from generating human-like text to powering …

Continue reading ›
Setting Sail: Keeping a Weathered Eye on the Horizon of Cloud Security

Setting Sail: Keeping a Weathered Eye on the Horizon of Cloud Security

As I hoist the sail on this new journey with Aqua, I was asked why did I join? Why am I thrilled to be part of this organization and what is it about Aqua’s approach to safeguarding cloud native systems that resonates with me?  For close to 20 years I have experienced building, transforming, and leading go-to-market …

Continue reading ›
Discover Cloud Security Issues Faster with Event-based Scanning

Discover Cloud Security Issues Faster with Event-based Scanning

In today's cloud security landscape, the challenge of keeping pace with evolving threats is daunting for security practitioners. Meanwhile, malicious actors operate at lightning speed, often breaching organizations and extracting valuable data within minutes, if not seconds. Imagine what they could accomplish in 24 …

Continue reading ›
Empowering Security: Bridging Talk to Action at RSA 2024

Empowering Security: Bridging Talk to Action at RSA 2024

As we gear up for another exciting RSA Conference, it's time to take stock of what's making waves in the world of cybersecurity. Sure, we all know that RSA is the go-to event for all things security, but what's the buzz this year? What are the hot topics? What’s really new?

Continue reading ›