<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Aqua Trivy - Aqua</title>
	<atom:link href="https://www.aquasec.com/category/trivy/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Cloud Native Security, Container Security &#38; Serverless Security</description>
	<lastBuildDate>Fri, 03 Apr 2026 21:30:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Update: Ongoing Investigation and Continued Remediation</title>
		<link>https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 01 Apr 2026 07:00:11 +0000</pubDate>
				<category><![CDATA[Aqua Trivy]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27408</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/" title="Update: Ongoing Investigation and Continued Remediation" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/10/Tile-Trivy-MCP-server-blog-image.jpg" alt="Update: Ongoing Investigation and Continued Remediation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Open Source Security Advisory Update: Wednesday, April 1, 2026 Boston, MA 10:00 AM ET Over the past week, we have nearly finalized our investigation and are now in the final stages of documentation and review. There continues to be no indication that Aqua’s commercial products have been affected. As part of this process, we identified&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Security That Speaks Your Language: Trivy MCP Server</title>
		<link>https://www.aquasec.com/blog/security-that-speaks-your-language-trivy-mcp-server/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 28 Oct 2025 12:00:33 +0000</pubDate>
				<category><![CDATA[Aqua Trivy]]></category>
		<category><![CDATA[Aqua Open Source]]></category>
		<category><![CDATA[Cloud Native Security]]></category>
		<category><![CDATA[Image Vulnerability Scanning]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26896</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/security-that-speaks-your-language-trivy-mcp-server/" title="Security That Speaks Your Language: Trivy MCP Server" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/10/Social-Trivy-MCP-server-blog-image-1200x628-1.jpg" alt="Security That Speaks Your Language: Trivy MCP Server" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>What if checking your project for vulnerabilities was as simple as asking a question? Or if your coding AI agent could automatically run a scan every time you changed a Dockerfile? The new Trivy MCP Server makes all that possible, and more. Built on the Model Context Protocol, Trivy MCP Server connects Trivy’s scanning capabilities&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Dev-First Security: Aqua Trivy Scanning Now in VS Code</title>
		<link>https://www.aquasec.com/blog/dev-first-security-aqua-trivy-scanning-vs-code-jetbrains/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 05 Aug 2025 11:55:16 +0000</pubDate>
				<category><![CDATA[Aqua Trivy]]></category>
		<category><![CDATA[Aqua Open Source]]></category>
		<category><![CDATA[Code security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26190</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/dev-first-security-aqua-trivy-scanning-vs-code-jetbrains/" title="Dev-First Security: Aqua Trivy Scanning Now in VS Code" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/08/Social-Trivy-VS-code-blog-1200x628-1.jpg" alt="Dev-First Security: Aqua Trivy Scanning Now in VS Code" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>In modern development workflows, integrating security seamlessly into the development process is crucial for delivering secure applications efficiently. Developers need security tools that work naturally within their development environment, providing immediate feedback without disrupting their workflow. The new Trivy extension for Visual Studio Code addresses this need by directly bringing comprehensive security scanning capabilities into&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Trivy Partners with echo: Slashing CVEs at the Source</title>
		<link>https://www.aquasec.com/blog/trivy-partners-with-echo/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 08 Jul 2025 11:50:48 +0000</pubDate>
				<category><![CDATA[Aqua Trivy]]></category>
		<category><![CDATA[Aqua Open Source]]></category>
		<category><![CDATA[Image Vulnerability Scanning]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=25925</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/trivy-partners-with-echo/" title="Trivy Partners with echo: Slashing CVEs at the Source" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/07/Social-Trivy-partners-with-Echo-blog-image.jpg" alt="Trivy Partners with echo: Slashing CVEs at the Source" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>This is a guest post by Echo Imagine starting every project with CVE-free base images, without adding any extra effort or tooling to your workflow. As developers and security teams, we know how hard it is to shift left when the base you&#8217;re building on is already vulnerable. That’s why we&#8217;re excited to be a&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>5 Must-See Sessions at KubeCon North America</title>
		<link>https://www.aquasec.com/blog/5-must-see-sessions-at-kubecon-north-america/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 04 Nov 2024 04:42:07 +0000</pubDate>
				<category><![CDATA[Aqua Trivy]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=23393</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/5-must-see-sessions-at-kubecon-north-america/" title="5 Must-See Sessions at KubeCon North America" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/10/blog-main-KubeCon-1200x628-2024-final.jpg" alt="5 Must-See Sessions at KubeCon North America" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Who’s getting excited? Next week, the Cloud Native Computing Foundation’s flagship conference, KubeCon + CloudNativeCon, will kick off in Salt Lake City, Utah. In its ninth year, the conference has grown into more than just a technical conference—it’s a vibrant community event that offers attendees the tools, relationships, and inspiration to drive innovation in the&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Trivy VEX Hub:The Solution to Vulnerability Fatigue</title>
		<link>https://www.aquasec.com/blog/introducing-vex-hub-unified-repository-for-vex-statements/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 16 Sep 2024 03:30:05 +0000</pubDate>
				<category><![CDATA[Aqua Trivy]]></category>
		<category><![CDATA[Aqua Open Source]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=22575</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/introducing-vex-hub-unified-repository-for-vex-statements/" title="Trivy VEX Hub:The Solution to Vulnerability Fatigue" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/09/Blog-image-Vexhub-1200x628blog-main-VEX-hub-1200x628-2024-final-1.jpg" alt="Trivy VEX Hub:The Solution to Vulnerability Fatigue" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>VEX (Vulnerability eXploitability Exchange) is an emerging industry standard for communicating the relevance and impact of security vulnerabilities on software artifacts. This approach allows software maintainers to indicate when a specific vulnerability in a software dependency is irrelevant to their software due to the specific use case of that dependency. By conveying this crucial information&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Scanning KBOM for Vulnerabilities with Trivy</title>
		<link>https://www.aquasec.com/blog/scanning-kbom-for-vulnerabilities-with-trivy/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 06 Nov 2023 11:56:28 +0000</pubDate>
				<category><![CDATA[Aqua Trivy]]></category>
		<category><![CDATA[Aqua Security]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[Kubernetes Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=14209</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/scanning-kbom-for-vulnerabilities-with-trivy/" title="Scanning KBOM for Vulnerabilities with Trivy" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2023/11/Scanning-KBOM-for-Vulnerabilities-with-Trivy.jpg" alt="Scanning KBOM for Vulnerabilities with Trivy" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Early this summer we announced the release of Kubernetes Bills of Material (KBOM) as part of Trivy, our all in one, popular open source security scanner. In the blog we discussed how KBOM is the manifest of all the important components that make up your Kubernetes cluster: Control plane components, Node Components, and Addons, including&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>New in Trivy: Kubernetes CIS Benchmark Scanning</title>
		<link>https://www.aquasec.com/blog/trivy-kubernetes-cis-benchmark-scanning/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 19 Apr 2023 09:59:00 +0000</pubDate>
				<category><![CDATA[Aqua Trivy]]></category>
		<category><![CDATA[Aqua Open Source]]></category>
		<category><![CDATA[Cloud compliance]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=14431</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/trivy-kubernetes-cis-benchmark-scanning/" title="New in Trivy: Kubernetes CIS Benchmark Scanning" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2023/04/Blog-Image-trivy-cis-scanning.jpg" alt="New in Trivy: Kubernetes CIS Benchmark Scanning" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>CIS (Center for Internet Security) compliance scanning is a standard in Kubernetes (K8s) security and is widely adopted across the industry with implementations in several security scanners. Kube-bench, an open source project developed by Aqua Security was one of the first projects to provide Kubernetes CIS compliance scanning and became a staple in K8s security.&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Kubernetes Benchmark Scans with Trivy: CIS and NSA Reports</title>
		<link>https://www.aquasec.com/blog/kubernetes-benchmark-scans-trivy-cis-nsa-reports/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 31 Jan 2023 18:11:13 +0000</pubDate>
				<category><![CDATA[Aqua Trivy]]></category>
		<category><![CDATA[CI/CD]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[Kubernetes Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=14486</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/kubernetes-benchmark-scans-trivy-cis-nsa-reports/" title="Kubernetes Benchmark Scans with Trivy: CIS and NSA Reports" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2023/01/BLOG-I1.jpg" alt="Kubernetes Benchmark Scans with Trivy: CIS and NSA Reports" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>One of Trivy’s core features is Trivy Kubernetes for in-cluster security scans of running workloads. This tutorial will showcase how to generate CIS and NSA reports both through the Trivy CLI and the Trivy Operator. Additionally, we will look at how users can add the Kubernetes Specification for their own Compliance Report format to expand&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Trivy Now Scans Amazon Machine Images (AMIs)</title>
		<link>https://www.aquasec.com/blog/trivy-now-scans-amazon-machine-images-amis/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 16:42:49 +0000</pubDate>
				<category><![CDATA[Aqua Trivy]]></category>
		<category><![CDATA[Aqua Open Source]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=14538</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/trivy-now-scans-amazon-machine-images-amis/" title="Trivy Now Scans Amazon Machine Images (AMIs)" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2022/12/Blog-Image-Trivy-can-now-scan-Virtual-Machines.jpg" alt="Trivy Now Scans Amazon Machine Images (AMIs)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>While more and more companies are moving to a cloud native technologies to manage their workloads and infrastructure, Virtual Machines (VMs) remain a staple infrastructure that powers many existing organizations and applications. Trivy, the all-in-one open-source security scanner, already scans most of the cloud native stack including containers, clusters, and clouds. Today, we are announcing&#160;&mldr;]]></description>
		
		
		
			</item>
	</channel>
</rss>
