<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VULNERABILITY MANAGEMENT - Aqua</title>
	<atom:link href="https://www.aquasec.com/category/vulnerability-management/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Cloud Native Security, Container Security &#38; Serverless Security</description>
	<lastBuildDate>Mon, 30 Jun 2025 12:19:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Patch, Ditch, Dodge, or Deal? Your Call on Vulnerabilities</title>
		<link>https://www.aquasec.com/blog/patch-ditch-dodge-deal-vulnerability-prioritization/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 30 Jun 2025 12:00:08 +0000</pubDate>
				<category><![CDATA[VULNERABILITY MANAGEMENT]]></category>
		<category><![CDATA[CNAPP]]></category>
		<category><![CDATA[Container Security]]></category>
		<category><![CDATA[Image Vulnerability Scanning]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=25872</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/patch-ditch-dodge-deal-vulnerability-prioritization/" title="Patch, Ditch, Dodge, or Deal? Your Call on Vulnerabilities" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/06/Social-image-vulnerabilities-blog.jpg" alt="Patch, Ditch, Dodge, or Deal? Your Call on Vulnerabilities" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Security teams are drowning in vulnerabilities. Cloud native environments can generate tens of thousands of new findings every month, even before factoring in CI/CD pipelines and third party dependencies. With this volume, the challenge is not just finding vulnerabilities, it is deciding what to do about them. Fix everything? Impossible. Ignore everything? Risky. The key&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Cut Through Alert Noise and Fix Toxic Combinations First</title>
		<link>https://www.aquasec.com/blog/alert-noise-fix-toxic-combinations-first/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 27 Mar 2025 13:00:39 +0000</pubDate>
				<category><![CDATA[VULNERABILITY MANAGEMENT]]></category>
		<category><![CDATA[Container Vulnerability]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=24952</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/alert-noise-fix-toxic-combinations-first/" title="Cut Through Alert Noise and Fix Toxic Combinations First" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/03/social-Fix-Toxic-Combinations-blog-image.jpg" alt="Cut Through Alert Noise and Fix Toxic Combinations First" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Not every security alert is a threat, but the right combination can bring down your cloud native and containerized applications. Security incidents rarely happen because of a single weak point. Instead, they stem from toxic combinations. A misconfigured workload might seem harmless on its own, but add exposed credentials and an unpatched vulnerability, and attackers&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>IngressNightmare Vulnerabilities: All You Need to Know</title>
		<link>https://www.aquasec.com/blog/ingress-nginx-vulnerabilities-what-you-need-to-know/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 26 Mar 2025 00:16:06 +0000</pubDate>
				<category><![CDATA[VULNERABILITY MANAGEMENT]]></category>
		<category><![CDATA[Container Security]]></category>
		<category><![CDATA[Kubernetes Security]]></category>
		<category><![CDATA[Security Threats]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=25002</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/ingress-nginx-vulnerabilities-what-you-need-to-know/" title="IngressNightmare Vulnerabilities: All You Need to Know" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/03/social-IngressNightmare-blog-image.jpg" alt="IngressNightmare Vulnerabilities: All You Need to Know" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>On March 24, 2025, a set of critical vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974 &#8212; collectively referred to as IngressNightmare was disclosed in the ingress-nginx Controller for Kubernetes. These vulnerabilities could lead to a complete cluster takeover by granting attackers unauthorized access to all secrets stored across all namespaces in the Kubernetes cluster. What is&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>New Aqua User Experience: Streamlined Vulnerability Management</title>
		<link>https://www.aquasec.com/blog/new-aqua-user-experience-streamline-vulnerability-management/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 14 Nov 2024 04:10:26 +0000</pubDate>
				<category><![CDATA[VULNERABILITY MANAGEMENT]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=23532</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/new-aqua-user-experience-streamline-vulnerability-management/" title="New Aqua User Experience: Streamlined Vulnerability Management" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/11/blog-main-Aqua-Hub-1200x628-2024-FINAL-1.jpg" alt="New Aqua User Experience: Streamlined Vulnerability Management" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>The new Aqua Hub update is designed to take the headache out of vulnerability management, addressing common challenges like alert overload and data consistency issues. With this update, teams get a clean, streamlined view of vulnerabilities that cuts through the noise, so they can focus on the critical issues without getting lost in irrelevant details.&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Muhstik Malware Targets Message Queuing Services Applications</title>
		<link>https://www.aquasec.com/blog/muhstik-malware-targets-message-queuing-services-applications/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 04 Jun 2024 16:39:29 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[VULNERABILITY MANAGEMENT]]></category>
		<category><![CDATA[Security Threats]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=20387</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/muhstik-malware-targets-message-queuing-services-applications/" title="Muhstik Malware Targets Message Queuing Services Applications" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/06/blog-main-muhstik-1200x628-2024.jpg" alt="Muhstik Malware Targets Message Queuing Services Applications" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Aqua Nautilus discovered a new campaign of Muhstik malware targeting message queuing services applications, specifically the Apache RocketMQ platform. Our investigation revealed that the attackers downloaded the known malware Muhstik onto the compromised instances by exploiting a known vulnerability in the platform. In this blog, we will explore how the attackers exploit the existing vulnerability&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>AI-Guided Remediation: Unify Teams and Speed Vulnerability Resolution</title>
		<link>https://www.aquasec.com/blog/ai-guided-remediation-unify-teams-and-speed-vulnerability-resolution/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 01 Aug 2023 08:55:26 +0000</pubDate>
				<category><![CDATA[VULNERABILITY MANAGEMENT]]></category>
		<category><![CDATA[AI Security]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=14299</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/ai-guided-remediation-unify-teams-and-speed-vulnerability-resolution/" title="AI-Guided Remediation: Unify Teams and Speed Vulnerability Resolution" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2023/08/Blog-image-AI-Guided-Remediation-Unifying-Teams-and-Accelerating-Vulnerability-Resolution-updated.jpg" alt="AI-Guided Remediation: Unify Teams and Speed Vulnerability Resolution" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>The urgent need for rapid remediation The window of vulnerability after the discovery of a security issue has never been more critical than it is with cloud native applications. Why is that? Cloud apps move fast. With modern CI/CD processes, code can be pushed to production multiple times per day. This means that security gaps&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Find the New OpenSSL Vulnerabilities with Trivy</title>
		<link>https://www.aquasec.com/blog/find-new-openssl-vulnerabilities-with-trivy/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 18:21:44 +0000</pubDate>
				<category><![CDATA[VULNERABILITY MANAGEMENT]]></category>
		<category><![CDATA[Image Vulnerability Scanning]]></category>
		<category><![CDATA[SBOMs]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=14568</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/find-new-openssl-vulnerabilities-with-trivy/" title="Find the New OpenSSL Vulnerabilities with Trivy" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2022/11/Blog-Image-Find-OpenSSL-CVE-Using-Trivy.jpg" alt="Find the New OpenSSL Vulnerabilities with Trivy" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Today, OpenSSL announced two new CVEs and mitigation recommendations. This blog provides guidance as to how you can identify the Open SSL vulnerability using Trivy. To both identify and mitigate the vulnerability, see this blog post Updated Security Advisory: New OpenSSL Vulnerabilities about mitigation with assurance policies in Aqua’s software supply chain solution. Package installed via&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>How Thoughtworks Manages Cloud Security and Container Vulnerabilities</title>
		<link>https://www.aquasec.com/blog/thoughtworks-cloud-security-vulnerability-scanning/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Fri, 24 Sep 2021 09:15:00 +0000</pubDate>
				<category><![CDATA[VULNERABILITY MANAGEMENT]]></category>
		<category><![CDATA[AWS Security]]></category>
		<category><![CDATA[Container Vulnerability]]></category>
		<category><![CDATA[CSPM]]></category>
		<category><![CDATA[Image Vulnerability Scanning]]></category>
		<category><![CDATA[Serverless-Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=15143</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/thoughtworks-cloud-security-vulnerability-scanning/" title="How Thoughtworks Manages Cloud Security and Container Vulnerabilities" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2021/09/09-21-Thoughtworks-teaser-blog-image.jpg" alt="How Thoughtworks Manages Cloud Security and Container Vulnerabilities" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Many companies, in an effort to modernize their software and cloud tech stacks, are beginning to confront the challenges of managing security across multiple cross-functional, yet independent, teams &#8211; each with diverse tech stacks. One such example is Thoughtworks, a leading global technology consultancy that works with enterprises to enable them to keep pace with&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Vulnerability Management in Container Images from Build to Runtime</title>
		<link>https://www.aquasec.com/blog/vulnerability-management-lifecycle/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 13 May 2021 10:03:53 +0000</pubDate>
				<category><![CDATA[VULNERABILITY MANAGEMENT]]></category>
		<category><![CDATA[CI/CD]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=15262</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/vulnerability-management-lifecycle/" title="Vulnerability Management in Container Images from Build to Runtime" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2021/05/No-title-CVE-remediation-blog-image.jpg" alt="Vulnerability Management in Container Images from Build to Runtime" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>When it comes to containerized workloads, resolving the underlying image&#8217;s security vulnerabilities is paramount to ensuring the safety of your environment. Getting security risk information into the hands of developers quickly and efficiently is key to keeping development cycles as short as possible while maintaining a strong application security posture. What risk information can you&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Aqua CyberCenter: Elevating Vulnerability Scanning Beyond the NVD</title>
		<link>https://www.aquasec.com/blog/vulnerability-scanning-process/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 22 Mar 2021 11:56:12 +0000</pubDate>
				<category><![CDATA[VULNERABILITY MANAGEMENT]]></category>
		<category><![CDATA[Cloud Native Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=15301</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/vulnerability-scanning-process/" title="Aqua CyberCenter: Elevating Vulnerability Scanning Beyond the NVD" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2021/03/CyberCenter-Blog-Image-v1.jpg" alt="Aqua CyberCenter: Elevating Vulnerability Scanning Beyond the NVD" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>The National Vulnerability Database (NVD), while a valuable source of vulnerability information, is inadequate for today’s cloud native ecosystem and the teams tasked with protecting it. The complex array of platforms, technologies, and deployment methodologies at play in cloud native environments means that detecting and remediating vulnerabilities (e.g., CVEs) does not eliminate all potential attack&#160;&mldr;]]></description>
		
		
		
			</item>
	</channel>
</rss>
