Moving forward, both Aqua Trivy and Aqua Starboard will form a fundamental part of GitLab’s container scanning roadmap, enabling users with best-in-class default security options.
BOSTON – June 21, 2021 – Aqua Security, the pure-play cloud native security leader, today announced its participation in the launch of the AWS CloudFormation Public Registry, with a published listing to enable customers to easily discover, seamlessly provision, and scale the Aqua Cloud Native Security Platform into their Amazon Web Services, Inc. (AWS) environments. …
BOSTON – June 21, 2021 – Aqua Security, the pure-play cloud native security leader, today published new research from Team Nautilus revealing a continued rise in cyberattacks targeting container infrastructure and supply chains, and showing that it can now take less than one hour to exploit vulnerable container infrastructure. The Cloud Native Threat Report: Attacks in the …
Assaf Morag, lead data analyst with Aqua’s Team Nautilus, said this discovery underscores the significance of detecting and fixing cloud misconfigurations promptly or preventing them from occurring before app deployment. Morag said security pros need to understand that the slightest misconfiguration might expose their containers and Kubernetes clusters to a cyberattack.
With this growth in volume has come an increase in sophistication, especially in terms of evasion techniques. “Adversaries are using more and more techniques designed to detect and remove security software,” note the Aqua researchers.
The cybersecurity landscape continues to spawn new companies and attract new investments. Aqua ranks #11 as a vendor to watch.
Cryptocurrency mining is the objective of many attacks, however adversaries are also using these attacks to deploy malware, create backdoors and steal credentials, according to the report. The report analyzes attacks during a six-month period using Aqua’s Dynamic Threat Analysis tool, which is backed by an open source project called Tracee.
Cloud-native security startup Aqua Security Software Ltd. today published new research revealing that it can now take less than an hour for vulnerable software container infrastructure to be exploited.