Aqua Security says PowerShell issue can allow attacks involving registration of malicious packages with names similar to existing popular package names when developers make mistakes.
A trio of PowerShell Gallery design flaws reported to Microsoft almost a year ago remain unfixed, leaving registry users vulnerable to typosquatting and supply chain attacks, according to Aqua Nautilus.
BOSTON—August 16, 2023—Aqua Security, the pioneer in cloud native security, today announced that it ranked as the Platform Leader in Innovation in the GigaOm Radar for Cloud Security Posture Management (CSPM). In this second annual report, Aqua is recognized as a full platform play with a unique approach to security, simple licensing and broadly applicable …
Kubernetes (K8s) clusters belonging to more than 350 organizations, open-source projects, and individuals have been detected as openly accessible and unprotected. That’s according to new findings from Aqua Security following a three-month-long investigation by its research team, Nautilus.
Aqua’s Eilon Elhadad weighs in on software supply chain security.
BOSTON—August 8, 2023—Aqua Security, the pioneer in cloud native security, today announced a three-month-long investigation by its research team. Aqua Nautilus uncovered Kubernetes clusters belonging to more than 350 organizations, open-source projects, and individuals, were openly accessible and unprotected. A notable subset of clusters was connected to vast conglomerates and Fortune 500 companies. At least …
Cloud native security provider Aqua Security has announced enhancement of the Aqua cloud security platform with the availability of AI-guided remediation capabilities.
Boston—August 1, 2023—Aqua Security, the pioneer in cloud native security, today announced enhancement of the Aqua Cloud Security Platform with the availability of AI-Guided Remediation capabilities. Now overburdened security teams can better operationalize risk findings to rapidly reduce risk and help developers quickly fix issues. According to the Cybersecurity and Infrastructure Security Agency, adversaries exploit …