<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Aqua</title>
	<atom:link href="https://www.aquasec.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aquasec.com/</link>
	<description>Cloud Native Security, Container Security &#38; Serverless Security</description>
	<lastBuildDate>Thu, 07 May 2026 12:59:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Known Techniques, Unknown Speed: How AI Changes the Attack Chain</title>
		<link>https://www.aquasec.com/blog/known-techniques-unknown-speed-how-ai-changes-the-attack-chain/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 07 May 2026 12:58:05 +0000</pubDate>
				<category><![CDATA[Autonomous Runtime Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27527</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/known-techniques-unknown-speed-how-ai-changes-the-attack-chain/" title="Known Techniques, Unknown Speed: How AI Changes the Attack Chain" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2026/05/social-blog-Known-techniques-unknown-speed.jpg" alt="Known Techniques, Unknown Speed: How AI Changes the Attack Chain" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>TLDR: AI-driven attacks on containerized environments are no longer theoretical. Frontier models can find vulnerabilities in hardened systems in hours and chain them into working exploits before your team has finished triaging the alert. When an attack moves that fast, the time your security program depends on between discovery and exploitation no longer exists. This&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Autonomous Runtime Security: Turning Runtime Intelligence into Agentic Response</title>
		<link>https://www.aquasec.com/blog/autonomous-runtime-security-turning-runtime-intelligence-into-agentic-response/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 05:30:26 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<category><![CDATA[AI Security]]></category>
		<category><![CDATA[Cloud Workload Protection Platform CWPP]]></category>
		<category><![CDATA[Container Security]]></category>
		<category><![CDATA[Runtime Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27398</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/autonomous-runtime-security-turning-runtime-intelligence-into-agentic-response/" title="Autonomous Runtime Security: Turning Runtime Intelligence into Agentic Response" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2026/03/Social-Reporting-and-Dashboards-Blog.jpg" alt="Autonomous Runtime Security: Turning Runtime Intelligence into Agentic Response" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Security teams have spent years and billions of dollars shifting security left. This has changed what teams can see and introduced a new level of visibility, but it has not helped with what they can control. Last year, more than 48,000 new vulnerabilities were cataloged, growing at roughly 20 percent annually. Add to that the&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Unveiling the Mythos Behind Runtime Security</title>
		<link>https://www.aquasec.com/blog/unveiling-the-mythos-behind-runtime-security/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 13:10:04 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27472</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/unveiling-the-mythos-behind-runtime-security/" title="Unveiling the Mythos Behind Runtime Security" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2026/04/Social-Unveiling-the-mythos-blog-1200x628-1.jpg" alt="Unveiling the Mythos Behind Runtime Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>TLDR: We are about to have a serious problem: attackers no longer need months to investigate and exploit systems, they need minutes. Anthropic says its unreleased Claude Mythos Preview can autonomously find severe vulnerabilities, reproduce them and in some cases chain them into working exploits across hardened systems. The model was deemed too dangerous to&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Update: Ongoing Investigation and Continued Remediation</title>
		<link>https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 01 Apr 2026 07:00:11 +0000</pubDate>
				<category><![CDATA[Aqua Trivy]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27408</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/" title="Update: Ongoing Investigation and Continued Remediation" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/10/Tile-Trivy-MCP-server-blog-image.jpg" alt="Update: Ongoing Investigation and Continued Remediation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Open Source Security Advisory Update: Wednesday, April 1, 2026 Boston, MA 10:00 AM ET Over the past week, we have nearly finalized our investigation and are now in the final stages of documentation and review. There continues to be no indication that Aqua’s commercial products have been affected. As part of this process, we identified&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>When AI Writes, Scans and Fixes Code, Runtime Becomes the Last Line of Defense</title>
		<link>https://www.aquasec.com/blog/when-ai-writes-scans-and-fixes-code-runtime-becomes-the-last-line-of-defense/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 07:04:42 +0000</pubDate>
				<category><![CDATA[RUNTIME SECURITY]]></category>
		<category><![CDATA[AI Security]]></category>
		<category><![CDATA[Aqua Security]]></category>
		<category><![CDATA[Cloud Native Security]]></category>
		<category><![CDATA[Cloud security]]></category>
		<category><![CDATA[Code security]]></category>
		<category><![CDATA[Container Security]]></category>
		<category><![CDATA[Runtime Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27357</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/when-ai-writes-scans-and-fixes-code-runtime-becomes-the-last-line-of-defense/" title="When AI Writes, Scans and Fixes Code, Runtime Becomes the Last Line of Defense" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2026/02/Social-cloude-code-blog-images.jpg" alt="When AI Writes, Scans and Fixes Code, Runtime Becomes the Last Line of Defense" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Anthropic recently launched Claude Code Security. Using its most advanced model, Claude Opus 4.6, the tool found over 500 high-severity vulnerabilities in production open-source codebases. These are bugs with security implications that had survived decades of expert review, continuous fuzzing, and multiple layers of automated scanning. The cybersecurity market reacted badly: roughly $15 billion in&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Aqua Security: Built for This Moment</title>
		<link>https://www.aquasec.com/blog/aqua-security-built-for-this-moment/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 12 Feb 2026 07:30:41 +0000</pubDate>
				<category><![CDATA[CNAPP]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27332</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/aqua-security-built-for-this-moment/" title="Aqua Security: Built for This Moment" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2026/02/SOCIAL-Aqua-2.0-blog-1200x628-1.jpg" alt="Aqua Security: Built for This Moment" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Cyber Security is cyclical. For years now cloud security has been focused on visibility: perform the scans, collect the data, generate the alerts, centralize the dashboards. That made sense when cloud native was new and teams were still figuring out how to operate in containers, Kubernetes, and ephemeral infrastructure. But the environment has changed. Cloud&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Cloud Threat Detection in 2026: The Growing Role of SecOps</title>
		<link>https://www.aquasec.com/blog/cloud-threat-detection-and-the-growing-role-of-secops/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 08 Jan 2026 07:30:46 +0000</pubDate>
				<category><![CDATA[RUNTIME SECURITY]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27281</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/cloud-threat-detection-and-the-growing-role-of-secops/" title="Cloud Threat Detection in 2026: The Growing Role of SecOps" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2026/01/Social-Gartner-blog-Cloud-Threat-Detection-2026.jpg" alt="Cloud Threat Detection in 2026: The Growing Role of SecOps" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Cloud threat detection is changing as attacks increasingly unfold inside running workloads rather than in static code or configuration layers. This shift affects how detection works in practice and how security teams are able to investigate incidents once alerts appear. In cloud environments, security operations rely on real time visibility to understand what workloads are&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Critical CVE in React Server Components Actively Exploited</title>
		<link>https://www.aquasec.com/blog/critical-cve-in-react-server-components-actively-exploited/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 09 Dec 2025 17:30:47 +0000</pubDate>
				<category><![CDATA[SECURITY RESEARCH]]></category>
		<category><![CDATA[Cloud Attacks]]></category>
		<category><![CDATA[Runtime Security]]></category>
		<category><![CDATA[Security Threats]]></category>
		<category><![CDATA[Supply Chain Attacks]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27227</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/critical-cve-in-react-server-components-actively-exploited/" title="Critical CVE in React Server Components Actively Exploited" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/12/social-react-server-blog-1200x628-1.jpg" alt="Critical CVE in React Server Components Actively Exploited" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>A newly disclosed vulnerability in React Server Components (RSC) dubbed as CVE-2025-55182, and also known as React2Shell, has introduced a severe remote code execution (RCE) vector impacting applications built with React 19 and frameworks that rely heavily on RSC, most notably Next.js. The flaw received a CVSS score of 10.0, reflecting its ease of exploitation,&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Selective Memory Dump Technique for Deeper Container Forensic Analysis</title>
		<link>https://www.aquasec.com/blog/selective-memory-dump-for-deep-container-forensic-analysis/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 17 Nov 2025 12:55:43 +0000</pubDate>
				<category><![CDATA[RUNTIME SECURITY]]></category>
		<category><![CDATA[Cloud Workload Protection Platform CWPP]]></category>
		<category><![CDATA[Container Security]]></category>
		<category><![CDATA[Runtime Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27025</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/selective-memory-dump-for-deep-container-forensic-analysis/" title="Selective Memory Dump Technique for Deeper Container Forensic Analysis" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/11/Social-container-memory-forensic-blog.jpg" alt="Selective Memory Dump Technique for Deeper Container Forensic Analysis" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Every attack leaves a trail, but in containerized environments, that trail can vanish before you even realize you have been attacked. Containers are short-lived, and attackers exploit this by executing malware in memory, loading hidden payloads, or deploying rootkits, then silently modifying or deleting evidence to cover their tracks. By the time security teams are&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Aqua at KubeCon 2025: Securing Cloud Native and AI Apps</title>
		<link>https://www.aquasec.com/blog/aqua-kubecon25-securing-cloud-native-and-ai-apps/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 04 Nov 2025 13:25:17 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26975</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/aqua-kubecon25-securing-cloud-native-and-ai-apps/" title="Aqua at KubeCon 2025: Securing Cloud Native and AI Apps" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/11/Social-Aqua-at-kubecon-blog-image-1200x628-1.jpg" alt="Aqua at KubeCon 2025: Securing Cloud Native and AI Apps" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Every KubeCon tells a story about where the cloud native world is headed. In 2025, that story is about the evolution of AI from a bad movie script to a core part of enterprise solutions. Cloud native applications and artificial intelligence are now part of the same conversation, with security emerging as the vital connection&#160;&mldr;]]></description>
		
		
		
			</item>
	</channel>
</rss>
