AI-Generated Malware in Panda Image Hides Persistent Linux Threat
Sign in
Contact
Support
We're hiring!
Aqua Security
Platform
Solutions
Resources
Company
Platform
Aqua Platform
Unified Cloud Security
Gain full visibility, reduce cloud and AI security risks, and stop attacks with Aqua’s fully integrated CNAPP.
Platform overview
All platform Integrations
Aqua CNAPP in action
Aqua Open Source
Driving security innovation in the cloud native community
Trivy
Tracee
Code Security
Scanning & Assurance
Scan artifacts across the entire software development lifecycle
Software Supply Chain Security
Protect your code, tools, and processes
Vulnerability Management
Advanced Code-to-Cloud vulnerability management to reduce noise and fix fast
Runtime Security
Container Security
Full lifecycle advanced protection for containerized applications
Cloud Workload Protection (CWPP)
Runtime protection for every cloud native workload
Hybrid-Cloud & Multi-Cloud Security
Code to Cloud security for hybrid and multi-cloud deployments
Posture Management
CI/CD Pipeline Security
Automate DevSecOps
Kubernetes Security
Holistic Kubernetes Security for the Enterprise
Cloud Security Posture Management
Extend traditional CSPM with workload visibility
What's New?
Operationalizing AI Security: Protecting Workloads Where AI Runs
Patch, Ditch, Dodge, or Deal? Your Call on Vulnerabilities
Securing LLM Apps with Aqua: Beyond the OWASP Checklist
What’s Really Happening in Your Containers? Aqua’s Risk Assessment Has the Answer
Solutions
Use Cases
Automate DevSecOps
Security and speed without compromise
GenAI Application Security
Secure GenAI Applications from Code to Runtime
Detection and Response
Cloud native detection & Response (CNDR)
Hybrid-Cloud & Multi-Cloud
Security for hybrid and multi-cloud deployments
Prove Compliance
Controls for PCI, HIPAA, GDPR, and beyond
Solutions
Docker Security
Enterprise-Grade security for Docker environments
AWS Cloud Security
Protect cloud native workloads on AWS
Google Cloud Security
Secure K8s apps on Google Cloud Platform
OpenShift Security
Cloud Native Security for Red Hat OpenShift
VMware Tanzu Security
Native security across VMware Tanzu
Azure Cloud Security
Complete Security for Azure Container Workloads
Industry
Federal
CNAPP solution for Federal Government
Financial Services
One platform for financial services
eBook
Hybrid Cloud, Multi-Cloud, Every Cloud, Secured.
Resources
The best of cloud native
Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Read the Blog
SEC vs. SolarWinds: A Cybersecurity Game Changer for CISOs
Accenture and Aqua Partner to Empower Cloud Security
Resources
Resources Center
eBooks, Data sheets, Whitepapers, Webinars, and much more
The Cloud Native Channel
Cloud native security webinars & videos
Aquademy
The Aqua academy
Cloud Native Wiki
The educational center for everything cloud native
Docker Containers
Software supply chain security
Cloud security
Kubernetes
Application Security
DevSecOps
Aqua research team
Security research focused on the cloud native stack to identify new threats and attack vectors
More security research
2023 Annual Aqua Nautilus Research
A Comprehensive Cloud Native Threat Report
Company
Recognized Leadership
CISO Choice Awards
Winner for Cloud Workload Protection Platform (CWPP)
Forrester Consulting: The Total Economic Impact™ of Aqua CNAPP
90% Reduction in vulnerability research and detection time
Frost & Sullivan CNAPP report
Top innovation leader
About Us
Newsroom
Customers
Partners
Careers
Support
Services
Upcoming Events
Connect
Contact
Twitter
Facebook
Linkedin
Instagram
News
VMBlog Q&A: Aqua Security Explores AI Workload Protection, Runtime Security, and the Evolution of Trivy
Aqua Security Named CyberSecurity Solution of the Year for Artificial Intelligence
Trivy Partner Connect Welcomes Root, Strengthens Open Source Security Ecosystem
Search
Get Started
Resource Center
›
Blog
All Topics
ai
Webinar-Video
AI Security
Kubernetes Security KSPM
Financial Services
CWPP
cloud attacks
Federal cloud native security
Software supply chain security
CNAPP
Container Security
AWS Security
Azure Security
CI/CD
Cloud Native Security
Cloud Security
CSPM
Compliance
Container Vulnerability
DevOps and DevSecOps
Docker Security
Dynamic Container Analysis
Google Cloud Security
Image Vulnerability Scanning
Open Source
Pivotal Cloud Foundry
Red Hat OpenShift
Runtime Security
Secrets Management
Secure VMs
Security Threats
Serverless
Service Mesh
Vulnerability Management
Blog
Infographic: From Cloud Security Posture Management to Real-Time CSPM
Blog
Securing GitHub Actions with Trivy and Cosign
Blog
Empowering Developers to Succeed: How and Why I Joined Aqua
Blog
The Nightmare Before Christmas: Looking Back at Log4j Vulnerabilities
Blog
Docker Security Best Practices
Blog
Taking IaC Security to the Next Level: Why TFsec Joined Aqua
Blog
Using LSM Hooks with Tracee to Overcome Gaps with Syscall Tracing
Blog
Infrastructure as Code security with Trivy
Blog
Detect and Prevent Exploits in Runtime with Vulnerability Shielding
Blog
The Story of Tracee: The Path to Runtime Security Tool
Blog
What’s New in the Docker and Kubernetes CIS Benchmarks
Blog
Vulnerability Scanning for Kubernetes Applications: Why and How
Blog
Boosting Container Security with Rootless Containers
Blog
Aqua’s Top Five Threat Alerts for 2020
Blog
Unveiling Aqua Vulnerability Database, Strengthen Your K8s Clusters
Blog
Taking Advantage of Object Labels while Controlling the Human Factor
Blog
Aqua Secures Container Image Support in AWS Lambda
Blog
Auto-Remediation for Secure Configuration in Azure Cloud
Blog
CVE-2020-15275: New Vulnerability Exploits containerd-shim API
Blog
Evaluating and Enforcing Least Privilege in Kubernetes with Aqua KSPM
Blog
Operationalize Your Cloud Native Security with Aqua’s New Dashboard
Blog
Runtime Protection for K8s Workloads Using a Mutating Admission Controller
Blog
Secure your Digital Transformation on Amazon EKS-Distro with Aqua
Blog
Threat Alert: Market-First Container Image Built to Attack Kubernetes Clusters
Blog
Threat Alert: Fileless Malware Executing in Containers
Blog
Automating Kubernetes Security Reporting with Starboard Operator by Aqua
Blog
CVE-2020-15157: Vulnerability in Containerd Can Leak Cloud Credentials
Blog
Find Image Vulnerabilities Using GitHub and Aqua Security Trivy Action
Blog
Hacktoberfest 2020: Celebrate Open Source with Aqua!
Blog
Introducing KSPM by Aqua: Kubernetes Security Posture Management
Blog
Scanning Registries at Scale with Rules-based Image Pulls
Blog
Deploy Aqua at the Speed of DevOps using Red Hat Marketplace
Blog
Protecting Cloud VMs for Full-Stack Cloud Native Security
Blog
Securing Container Workloads on AWS Bottlerocket
Blog
Threat Alert: Massive Cryptomining Campaign Abusing GitHub, Docker Hub, Travis CI & Circle CI
Blog
Deep Analysis of TeamTNT Techniques Using Container Images to Attack
Blog
How GitLab Innovates DevOps Security Using Aqua Trivy
Blog
Uncover Malware Payload Executions Automatically with Tracee
Blog
Threat Alert: An Attack Against a Docker API Leads To Hidden Cryptominers
Blog
Using Trivy to Discover Vulnerabilities in VS Code Projects
Blog
Threat Alert: Attacker Building Malicious Images Directly on Your Host
Blog
Role-Based Access Control in Modern Cloud Native Security
Blog
Risk-Based Vulnerability Management in Container Images
Blog
Starboard: The Kubernetes-Native Toolkit for Unifying Security
Blog
Visualize and Prioritize Risks in Kubernetes with Aqua Risk Explorer
Blog
Aqua Partners with GCP to Secure Windows Containers on GKE
Blog
Dynamic Threat Analysis for Container Images: Uncovering Hidden Risks
Blog
Threat Alert: Kinsing Malware Attacks Targeting Container Environments
Blog
Blocking Attacks in Runtime with Drift Prevention
Blog
Trivy Image Vulnerability Scanner Now Under Apache 2.0 License
Blog
Scanning Image Layers, Prometheus, and Harbor Integrations
Blog
Aqua CSP Globally Whitelisted for ARO: Red Hat OpenShift on Azure
Blog
Kube-Query: A Simpler Way to Query Your Kubernetes Clusters
Blog
CloudSploit Delivers Best Practices for Oracle Cloud Security
Blog
Announcing General Availability of CloudSploit by Aqua for GCP
Blog
Threat Alert: Exploiting Open Docker Daemons for DDoS Attacks
Blog
A Deep Dive into eBPF:
The Technology that Powers Tracee
Blog
What You Need to Know About AWS Lambda Functions Risk Mitigation
Blog
Cloud Native Security Best Practices: Using Kubernetes Admission Controller for Image Assurance
Blog
A Brief History of Containers: From the 1970s Till Now
Blog
Cloud Native Best Practices: Security Policies in CI/CD Pipelines
Blog
Pluggable Image Vulnerability Scanners for Harbor
Blog
Aqua Integrates with AWS Security Hub: Closing the Gap on Cloud Native Security
Blog
DevSecOps with Trivy and GitHub Actions
Blog
Tracee: Tracing Containers with eBPF
Blog
Performance-Optimized Runtime Protection for Serverless Functions
with Aqua
Blog
Optimized Logging for Container Workloads Using AWS FireLens
Blog
Cloud Native Security Best Practices: Vulnerability Management
Blog
Cloud VM Security with Aqua CSP
Blog
Native Runtime Protection for
Pivotal Cloud Foundry
Blog
CVE-2019-14287 sudo Vulnerability Allows Bypass of User Restrictions
Blog
Securing Hybrid Cloud Workloads on Google Anthos
Blog
Kubernetes RBAC: Asking for Forgiveness or Getting Permission
Blog
DNS Spoofing on Kubernetes Clusters
Blog
Kubernetes Pod Escape
Using Log Mounts
Blog
Aqua Operator: Automating Security for Kubernetes
Blog
Knative: The Serverless Environment for Kubernetes Fans
Blog
Security Configuration Benchmarks for Kubernetes
Blog
Istio Security: Zero-Trust Networking
Blog
Serverless Security: The Importance of FaaS Risk Assessment
Blog
Istio: The Enterprise Upgrade Path to Microservices
Blog
Severe Privilege Escalation Vulnerability in Kubernetes (CVE-2018-1002105)
Blog
Protecting AWS Fargate Containers at Runtime
Blog
Kube-Bench: An OSS Tool for Running Kubernetes CIS Benchmark Tests
Blog
Streamline Image
Vulnerability Management for
OpenShift Image Streams
Blog
Kube-hunter: An Open Source Tool for Kubernetes Penetration Testing
Blog
Aqua Integrates with Google’s Cloud Security Command Center
Blog
Aqua MicroScanner:
Free Image Vulnerability Scanning Plugin for Jenkins
Blog
Kubernetes Security Deep-Dive
Blog
Aqua on OpenShift
Level-Up Your Container Security Game - Part I
Blog
Securing Serverless: Persistent Security for Ephemeral Environments
Blog
How to Secure Amazon ECS Workloads On Demand
Blog
MicroScanner: Free Image Vulnerability Scanner for Developers
Blog
Grafeas and Image Vulnerability Scanning
Blog
Kubernetes 1.10: What’s New in Security
Blog
Governance and Control for The Container Supply Chain Using Aqua Security and Google Grafeas
Blog
Managing Secrets in Docker Containers
Blog
Securing Containers on OpenShift
Blog
Docker Networking and Kubernetes Networking Tools
Aqua Security