Vulnerability Management - Aqua https://www.aquasec.com/tag/vulnerability-management/ Cloud Native Security, Container Security & Serverless Security Mon, 15 Jul 2024 09:37:35 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 Lucifer DDoS botnet Malware is Targeting Apache Big-Data Stack  https://www.aquasec.com/blog/lucifer-ddos-botnet-malware-is-targeting-apache-big-data-stack/ Wed, 21 Feb 2024 07:58:29 +0000 https://www.aquasec.com/?p=17472 Lucifer DDoS botnet Malware is Targeting Apache Big-Data Stack Aqua Nautilus has unveiled a new campaign targeting Apache big-data stack, specifically Apache Hadoop and Apache Druid. Upon investigation, it was discovered that the attacker exploits existing misconfigurations and vulnerabilities within our Apache cloud honeypots to execute the attacks. The campaign employs a new variant of a well-known DDoS botnet that focuses on vulnerable Linux …]]> Snap Trap: The Hidden Dangers Within Ubuntu’s Package Suggestion System https://www.aquasec.com/blog/snap-trap-the-hidden-dangers-within-ubuntus-package-suggestion-system/ Wed, 14 Feb 2024 06:00:55 +0000 https://www.aquasec.com/?p=17482 Snap Trap: The Hidden Dangers Within Ubuntu’s Package Suggestion SystemAqua Nautilus researchers have identified a security issue that arises from the interaction between Ubuntu’s command-not-found package and the snap package repository. While command-not-found serves as a convenient tool for suggesting installations for uninstalled commands, it can be inadvertently manipulated by attackers through the snap repository, leading to deceptive recommendations of malicious packages. Additionally, our …]]> AI-Guided Remediation: Unify Teams and Speed Vulnerability Resolution https://www.aquasec.com/blog/ai-guided-remediation-unify-teams-and-speed-vulnerability-resolution/ Tue, 01 Aug 2023 08:55:26 +0000 https://www.aquasec.com/?p=14299 AI-Guided Remediation: Unify Teams and Speed Vulnerability ResolutionThe urgent need for rapid remediation The window of vulnerability after the discovery of a security issue has never been more critical than it is with cloud native applications. Why is that? Cloud apps move fast. With modern CI/CD processes, code can be pushed to production multiple times per day. This means that security gaps …]]> Zero-Day Attack Prevention Through Supply Chain Security https://www.aquasec.com/blog/zero-day-attack-prevention-through-supply-chain-security/ Thu, 02 Mar 2023 14:46:13 +0000 https://www.aquasec.com/?p=14460 Zero-Day Attack Prevention Through Supply Chain SecuritySupply chain security has made lots of headlines recently thanks to events like the SolarWinds breach. That and similar events highlight the importance of having a strategy in place to respond to zero-day attacks which can take advantage of vulnerable software components. I recently organized a webinar with and Teresa Pepper, our EMEA Partner Manager. …]]> Establishing a Resilient DevSecOps Action Plan https://www.aquasec.com/blog/establishing-resilient-devsecops/ Thu, 23 Feb 2023 11:00:00 +0000 https://www.aquasec.com/?p=14461 Establishing a Resilient DevSecOps Action PlanDevSecOps is an easy term to toss around. But what does it mean, exactly? What actually goes into an effective DevSecOps strategy? And how do cloud and DevOps impact DevSecOps processes?  To find out, I participated in a conversation with Merritt Baer, principal in the AWS Office of the CISO, to discuss the best ways …]]> Technical Review: A Deep Analysis of the Dirty Pipe Vulnerability https://www.aquasec.com/blog/deep-analysis-of-the-dirty-pipe-vulnerability/ Wed, 14 Dec 2022 11:00:00 +0000 https://www.aquasec.com/?p=14522 Technical Review: A Deep Analysis of the Dirty Pipe VulnerabilityDirty Pipe (CVE-2022-0847) proved that there is a new way to exploit Linux syscalls to write to files with a read-only privileges. The fact that someone can write to a file regardless of its permissions is a big security threat. An application of this vulnerability would be to write on the host from an unprivileged …]]> Kubernetes Version 1.26: An Overview https://www.aquasec.com/blog/kubernetes-version-1-26-an-overview/ Thu, 08 Dec 2022 15:00:00 +0000 https://www.aquasec.com/?p=14533 Kubernetes Version 1.26: An OverviewKubernetes Version 1.26 was released with 37 new enhancements including 11 Stable, 10 Beta, 16 Alpha, and 12 features deprecated or removed. In this blog, we will highlight its most notable features and show how using Trivy will help you find deprecated Kubernetes resources. registry.k8s.io, Generally Available The container image registry has changed from k8s.gcr.io …]]> Trivy Now Scans Amazon Machine Images (AMIs) https://www.aquasec.com/blog/trivy-now-scans-amazon-machine-images-amis/ Thu, 01 Dec 2022 16:42:49 +0000 https://www.aquasec.com/?p=14538 Trivy Now Scans Amazon Machine Images (AMIs)While more and more companies are moving to a cloud native technologies to manage their workloads and infrastructure, Virtual Machines (VMs) remain a staple infrastructure that powers many existing organizations and applications. Trivy, the all-in-one open-source security scanner, already scans most of the cloud native stack including containers, clusters, and clouds. Today, we are announcing …]]> Find the New OpenSSL Vulnerabilities with Trivy https://www.aquasec.com/blog/find-new-openssl-vulnerabilities-with-trivy/ Tue, 01 Nov 2022 18:21:44 +0000 https://www.aquasec.com/?p=14568 Find the New OpenSSL Vulnerabilities with TrivyToday, OpenSSL announced two new CVEs and mitigation recommendations. This blog provides guidance as to how you can identify the Open SSL vulnerability using Trivy. To both identify and mitigate the vulnerability, see this blog post Updated Security Advisory: New OpenSSL Vulnerabilities about mitigation with assurance policies in Aqua’s software supply chain solution. Package installed via …]]> Vulnerability Scanning: Trivy vs the Trivy Operator https://www.aquasec.com/blog/vulnerability-scanning-trivy-vs-the-trivy-operator/ Thu, 13 Oct 2022 15:29:20 +0000 https://www.aquasec.com/?p=14592 Vulnerability Scanning: Trivy vs the Trivy OperatorOver the past few months Aqua Trivy, the all-in-one cloud native security scanner, has rapidly grown in features and tapped into new use cases. In this blog post, we will explore An overview of Trivy The different use cases that Trivy covers An overview of the Trivy Operator The difference between Trivy and the Trivy …]]>