<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Aqua Nautilus Research Team</title>
	<atom:link href="https://www.aquasec.com/category/research/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aquasec.com/category/research/</link>
	<description>Cloud Native Security, Container Security &#38; Serverless Security</description>
	<lastBuildDate>Tue, 09 Dec 2025 17:26:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Critical CVE in React Server Components Actively Exploited</title>
		<link>https://www.aquasec.com/blog/critical-cve-in-react-server-components-actively-exploited/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 09 Dec 2025 17:30:47 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[Cloud Attacks]]></category>
		<category><![CDATA[Runtime Security]]></category>
		<category><![CDATA[Security Threats]]></category>
		<category><![CDATA[Supply Chain Attacks]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27227</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/critical-cve-in-react-server-components-actively-exploited/" title="Critical CVE in React Server Components Actively Exploited" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/12/social-react-server-blog-1200x628-1.jpg" alt="Critical CVE in React Server Components Actively Exploited" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>A newly disclosed vulnerability in React Server Components (RSC) dubbed as CVE-2025-55182, and also known as React2Shell, has introduced a severe remote code execution (RCE) vector impacting applications built with React 19 and frameworks that rely heavily on RSC, most notably Next.js. The flaw received a CVSS score of 10.0, reflecting its ease of exploitation,&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Kaiji Malware: Anatomy, Persistence and Detection</title>
		<link>https://www.aquasec.com/blog/kaiji-malware-anatomy-persistence-detection/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 14 Oct 2025 11:55:48 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[Advanced malware protection]]></category>
		<category><![CDATA[Malware Attacks]]></category>
		<category><![CDATA[Security Threats]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26744</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/kaiji-malware-anatomy-persistence-detection/" title="Kaiji Malware: Anatomy, Persistence and Detection" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/10/Social-Kaiji-malware-blog-1200x628_2.jpg" alt="Kaiji Malware: Anatomy, Persistence and Detection" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Kaiji malware has emerged as a significant threat in recent years, particularly targeting Linux-based servers and IoT devices. This malware is designed to exploit internet connected services and devices to gain unauthorized access to systems. Once inside, Kaiji establishes persistence through various techniques, including creating system services and modifying system configurations. Its primary objectives are&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>AI-Generated Malware in Panda Image Hides Persistent Linux Threat</title>
		<link>https://www.aquasec.com/blog/ai-generated-malware-in-panda-image-hides-persistent-linux-threat/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 24 Jul 2025 12:03:04 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[AI Security]]></category>
		<category><![CDATA[Cloud Native Security]]></category>
		<category><![CDATA[Malware Attacks]]></category>
		<category><![CDATA[Security Threats]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26069</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/ai-generated-malware-in-panda-image-hides-persistent-linux-threat/" title="AI-Generated Malware in Panda Image Hides Persistent Linux Threat" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/07/Social-Panda-blog-image-1200x628-1.jpg" alt="AI-Generated Malware in Panda Image Hides Persistent Linux Threat" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>The line between human and machine-generated threats is starting to blur. Aqua Nautilus recently uncovered a malware campaign that hints at this unsettling shift. Koske, a sophisticated Linux threat, shows clear signs of AI-assisted development, likely with help from a large language model. With modular payloads, evasive rootkits, and delivery through weaponized image files, Koske&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Shadow Roles: AWS Defaults Can Open the Door to Service Takeover</title>
		<link>https://www.aquasec.com/blog/shadow-roles-aws-defaults-lead-to-service-takeover/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 29 Apr 2025 15:50:31 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[AWS Security]]></category>
		<category><![CDATA[Security Threats]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=25312</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/shadow-roles-aws-defaults-lead-to-service-takeover/" title="Shadow Roles: AWS Defaults Can Open the Door to Service Takeover" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/04/Main-and-Social-Shadow-roles-blog-1200x628-1.jpg" alt="Shadow Roles: AWS Defaults Can Open the Door to Service Takeover" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>What if the biggest risk to your cloud environment wasn’t a misconfiguration you made, but one baked into the defaults? Our research uncovered security concerns in the deployment of resources within a few AWS services, specifically in the default AWS service roles. These roles, often created automatically or recommended during setup, grant overly broad permissions,&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Tomcat in the Crosshairs: New Research Reveals Ongoing Attacks</title>
		<link>https://www.aquasec.com/blog/new-campaign-against-apache-tomcat/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 02 Apr 2025 12:00:28 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[Container Security]]></category>
		<category><![CDATA[Security Threats]]></category>
		<category><![CDATA[Software Supply Chain Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=25090</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/new-campaign-against-apache-tomcat/" title="Tomcat in the Crosshairs: New Research Reveals Ongoing Attacks" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/03/Social-Campaign-against-Apache-Tomcat-blog_-1.jpg" alt="Tomcat in the Crosshairs: New Research Reveals Ongoing Attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>News headlines reported that it took just 30 hours for attackers to exploit a newly discovered vulnerability in Apache Tomcat servers. But what does this mean for workloads relying on Tomcat? Aqua Nautilus researchers discovered a new attack campaign targeting Apache Tomcat. In this blog, we shed light on newly discovered malware that targets Tomcat&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Stopping Sobolan Malware with Aqua Runtime Protection  </title>
		<link>https://www.aquasec.com/blog/stopping-sobolan-with-aqua-runtime-protection/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 10 Mar 2025 11:48:27 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[CNAPP]]></category>
		<category><![CDATA[Runtime Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=24801</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/stopping-sobolan-with-aqua-runtime-protection/" title="Stopping Sobolan Malware with Aqua Runtime Protection  " class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/03/social-Sobolan-blog-image-1200x628-2.jpg" alt="Stopping Sobolan Malware with Aqua Runtime Protection  " class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Aqua Nautilus researchers have discovered a new attack campaign targeting interactive computing environments such as Jupyter Notebooks. The attack consists of multiple stages, beginning with the download of a compressed file from a remote server. Once executed, the attacker deploys several malicious tools to exploit the server and establish persistence. This campaign poses a significant&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>OPA Gatekeeper Bypass Reveals Risks in Kubernetes Policy Engines</title>
		<link>https://www.aquasec.com/blog/risks-misconfigured-kubernetes-policy-engines-opa-gatekeeper/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 03 Feb 2025 13:55:50 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[Kubernetes Security]]></category>
		<category><![CDATA[Security Threats]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=24364</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/risks-misconfigured-kubernetes-policy-engines-opa-gatekeeper/" title="OPA Gatekeeper Bypass Reveals Risks in Kubernetes Policy Engines" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/02/opa-blog-image-main-1200x628-text-up-2.jpg" alt="OPA Gatekeeper Bypass Reveals Risks in Kubernetes Policy Engines" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Implementing Kubernetes securely can be a daunting task. Fortunately, there are tools in the K8s toolshed that provide out-of-the-box solutions using a single click. One such tools is OPA Gatekeeper. It is a great out-of-the-box security checkpoint to enforce security policies on Kubernetes. But are users using it correctly? Do they understand its limitations? Our&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>300,000+ Prometheus Servers and Exporters Exposed to DoS Attacks</title>
		<link>https://www.aquasec.com/blog/300000-prometheus-servers-and-exporters-exposed-to-dos-attacks/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 12 Dec 2024 04:46:45 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[Security Threats]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=23809</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/300000-prometheus-servers-and-exporters-exposed-to-dos-attacks/" title="300,000+ Prometheus Servers and Exporters Exposed to DoS Attacks" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/12/Prometheus-blog-main-image-text.jpg" alt="300,000+ Prometheus Servers and Exporters Exposed to DoS Attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>In this research, we uncovered several vulnerabilities and security flaws within the Prometheus ecosystem. These findings span across three major areas: information disclosure, denial-of-service (DoS), and code execution.  We found that exposed Prometheus servers or exporters, often lacking proper authentication, allowed attackers to easily gather sensitive information, such as credentials and API keys.    Additionally, we&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Matrix Unleashes A New Widespread DDoS Campaign</title>
		<link>https://www.aquasec.com/blog/matrix-unleashes-a-new-widespread-ddos-campaign/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 26 Nov 2024 03:51:18 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[Security Threats]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=23676</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/matrix-unleashes-a-new-widespread-ddos-campaign/" title="Matrix Unleashes A New Widespread DDoS Campaign" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/11/matrix-blog-main-text-1200x628-1.jpg" alt="Matrix Unleashes A New Widespread DDoS Campaign" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Aqua Nautilus researchers uncovered a new and widespread Distributed Denial-of-Service (DDoS) campaign orchestrated by a threat actor named Matrix. Triggered by activities detected on our honeypots, this investigation dives deep into Matrix’s methods, targets, tools, and overall goals.    This campaign highlights how accessible tools and minimal technical knowledge can enable large-scale cyberattacks. Matrix demonstrates a&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Threat Actors Hijack Misconfigured Servers for Live Sports Streaming</title>
		<link>https://www.aquasec.com/blog/threat-actors-hijack-misconfigured-servers-for-live-sports-streaming/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 19 Nov 2024 04:51:16 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[Security Threats]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=23588</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/threat-actors-hijack-misconfigured-servers-for-live-sports-streaming/" title="Threat Actors Hijack Misconfigured Servers for Live Sports Streaming" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/11/Blog-Stream_Ripping-main-text.jpg" alt="Threat Actors Hijack Misconfigured Servers for Live Sports Streaming" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>To keep up with the ever-evolving world of cybersecurity, Aqua Nautilus researchers deploy honeypots that mimic real-world development environments. During a recent threat-hunting operation, they uncovered a surprising new attack vector: threat actors using misconfigured servers to hijack environments for streaming sports events. By exploiting misconfigured JupyterLab and Jupyter Notebook applications, attackers drop live streaming&#160;&mldr;]]></description>
		
		
		
			</item>
	</channel>
</rss>
