Aqua https://www.aquasec.com/ Cloud Native Security, Container Security & Serverless Security Wed, 18 Dec 2024 13:56:26 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 Cloud Security Trends: Predictions and Strategies for Resilience https://www.aquasec.com/blog/cloud-security-trends-predictions-and-strategies-for-resilience/ Wed, 18 Dec 2024 05:28:51 +0000 https://www.aquasec.com/?p=23893 Cloud Security Trends: Predictions and Strategies for ResilienceIn 2025, cloud native security is set to undergo transformative progress. As Chief Information Security Officer at Aqua, I’ve seen how rapidly evolving threats and operational demands are driving organizations to redefine their approach to security. The focus is no longer just on adapting to challenges—it’s about deeply embedding security into every facet of development …]]> 300,000+ Prometheus Servers and Exporters Exposed to DoS Attacks https://www.aquasec.com/blog/300000-prometheus-servers-and-exporters-exposed-to-dos-attacks/ Thu, 12 Dec 2024 04:46:45 +0000 https://www.aquasec.com/?p=23809 300,000+ Prometheus Servers and Exporters Exposed to DoS AttacksIn this research, we uncovered several vulnerabilities and security flaws within the Prometheus ecosystem. These findings span across three major areas: information disclosure, denial-of-service (DoS), and code execution.  We found that exposed Prometheus servers or exporters, often lacking proper authentication, allowed attackers to easily gather sensitive information, such as credentials and API keys.    Additionally, we …]]> From Theory to Practice: How to Make DevSecOps Work in Your Organization https://www.aquasec.com/blog/from-theory-to-practice-how-to-make-devsecops-work-in-your-organization/ Wed, 04 Dec 2024 07:10:06 +0000 https://www.aquasec.com/?p=23789 From Theory to Practice: How to Make DevSecOps Work in Your OrganizationHouston, we have a problem: implementing DevSecOps isn’t as straightforward as it seems. DevSecOps has redefined security in modern software development, becoming the benchmark for organizational success. By embedding security into every phase of the development lifecycle, organizations can deploy faster and collaborate more efficiently while ensuring security at every step. Yet, despite its advantages, …]]> Matrix Unleashes A New Widespread DDoS Campaign https://www.aquasec.com/blog/matrix-unleashes-a-new-widespread-ddos-campaign/ Tue, 26 Nov 2024 03:51:18 +0000 https://www.aquasec.com/?p=23676 Matrix Unleashes A New Widespread DDoS CampaignAqua Nautilus researchers uncovered a new and widespread Distributed Denial-of-Service (DDoS) campaign orchestrated by a threat actor named Matrix. Triggered by activities detected on our honeypots, this investigation dives deep into Matrix’s methods, targets, tools, and overall goals.    This campaign highlights how accessible tools and minimal technical knowledge can enable large-scale cyberattacks. Matrix demonstrates a …]]> Threat Actors Hijack Misconfigured Servers for Live Sports Streaming https://www.aquasec.com/blog/threat-actors-hijack-misconfigured-servers-for-live-sports-streaming/ Tue, 19 Nov 2024 04:51:16 +0000 https://www.aquasec.com/?p=23588 Threat Actors Hijack Misconfigured Servers for Live Sports StreamingTo keep up with the ever-evolving world of cybersecurity, Aqua Nautilus researchers deploy honeypots that mimic real-world development environments. During a recent threat-hunting operation, they uncovered a surprising new attack vector: threat actors using misconfigured servers to hijack environments for streaming sports events. By exploiting misconfigured JupyterLab and Jupyter Notebook applications, attackers drop live streaming …]]> New Aqua User Experience: Streamlined Vulnerability Management https://www.aquasec.com/blog/new-aqua-user-experience-streamline-vulnerability-management/ Thu, 14 Nov 2024 04:10:26 +0000 https://www.aquasec.com/?p=23532 New Aqua User Experience: Streamlined Vulnerability ManagementThe new Aqua Hub update is designed to take the headache out of vulnerability management, addressing common challenges like alert overload and data consistency issues. With this update, teams get a clean, streamlined view of vulnerabilities that cuts through the noise, so they can focus on the critical issues without getting lost in irrelevant details. …]]> Enhancing UK Cybersecurity and Resilience: Impact of the New National Bill https://www.aquasec.com/blog/enhancing-uk-cybersecurity-and-resilience-impact-of-the-new-national-bill/ Fri, 08 Nov 2024 14:06:13 +0000 https://www.aquasec.com/?p=23516 Enhancing UK Cybersecurity and Resilience: Impact of the New National BillAs the digital landscape rapidly evolves, the need for a robust, adaptive security strategy becomes increasingly critical. Cyber threats are becoming more sophisticated and widespread, necessitating a proactive approach to cybersecurity. The UK’s Cyber Security and Resilience Bill represents a significant stride towards fortifying the nation’s defenses against these threats. This legislation aims to bolster …]]> 5 Must-See Sessions at KubeCon North America https://www.aquasec.com/blog/5-must-see-sessions-at-kubecon-north-america/ Mon, 04 Nov 2024 04:42:07 +0000 https://www.aquasec.com/?p=23393 5 Must-See Sessions at KubeCon North AmericaWho’s getting excited? Next week, the Cloud Native Computing Foundation’s flagship conference, KubeCon + CloudNativeCon, will kick off in Salt Lake City, Utah. In its ninth year, the conference has grown into more than just a technical conference—it’s a vibrant community event that offers attendees the tools, relationships, and inspiration to drive innovation in the …]]> TeamTNT’s Docker Gatling Gun Campaign https://www.aquasec.com/blog/threat-alert-teamtnts-docker-gatling-gun-campaign/ Fri, 25 Oct 2024 05:05:37 +0000 https://www.aquasec.com/?p=23151 TeamTNT’s Docker Gatling Gun CampaignLong time no see, Aqua Nautilus researchers have identified a new campaign in the making by TeamTNT, a notorious hacking group. In this campaign, TeamTNT appears to be returning to its roots while preparing for a large-scale attack on cloud native environments. The group is currently targeting exposed Docker daemons to deploy Sliver malware, a …]]> AWS CDK Risk: Exploiting a Missing S3 Bucket Allowed Account Takeover https://www.aquasec.com/blog/aws-cdk-risk-exploiting-a-missing-s3-bucket-allowed-account-takeover/ Thu, 24 Oct 2024 05:07:33 +0000 https://www.aquasec.com/?p=23115 AWS CDK Risk: Exploiting a Missing S3 Bucket Allowed Account TakeoverIn June 2024, we uncovered a security issue related to the AWS Cloud Development Kit (CDK), an open-source project. This discovery adds to the six other vulnerabilities we discovered within AWS services.  The impact of this issue could, in certain scenarios (outlined in the blog), allow an attacker to gain administrative access to a target AWS account, …]]>