News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

New cryptomining malware discovered
B2B Cyber ​​Security ShortNews

Security researchers have discovered a new cryptomining campaign called Lucifer that targets Apache and in particular the software libraries Hadoop and Druid, which are popular with many users. To do this, the attackers exploit existing misconfigurations and vulnerabilities. The active campaign uses a new variant of a well-known DDoS botnet focused on vulnerable Linux systems. The malware is known as “Lucifer” and, once compromised, uses infected Apache servers to mine the cryptocurrency Monero. The cybercriminals behind Lucifer focus on the Apache libraries Hadoop and Druid, which are very popular with developers, and...

Read more

Resolve vulnerabilities faster with generative AI
Resolve vulnerabilities faster with generative AI

AI-powered recovery helps security teams process vulnerability alerts faster and simplifies their collaboration with development teams. Aqua Security, the pioneer in cloud-native security, expands its Cloud Security Platform with AI-powered recovery for misconfigurations and vulnerabilities. The AI-Guided Remediation feature allows busy security teams to process new vulnerability alerts more quickly to quickly reduce risk and help developers quickly remediate issues. AI-powered remediation The new feature leverages generative AI, is part of Aqua's SaaS extension to Cloud Security Platform, and is available with an Open AI integration with ChatGPT. Goal of integration…

Read more

New tactics used by cyber criminals
B2B Cyber ​​Security ShortNews

Based on analysis of actual attacks, the Cloud Native Threat Report provides IT security professionals with insight into the changing tactics, techniques and procedures of cybercriminals - so they can better protect their cloud environments. The "Cloud Native Threat Report" summarizes the investigations of Aqua's research team Nautilus from the past year. The report covers three key areas: the software supply chain, the current risk situation including vulnerabilities and misconfigurations, and runtime protection. One of the key takeaways: Criminals are investing heavily in resources to avoid detection, as well as being stronger in compromised systems…

Read more

Defense against container-based zero-day attacks
Defense against container-based zero-day attacks

A new cloud-native security solution can stop zero-day attacks and shield critical production vulnerabilities until a patch can be applied. Aqua Security introduces the eBPF Lightning Enforcer. Powered by new eBPF technology, Lightning Enforcer provides full visibility into running workloads, making it easy for security professionals to identify and stop even advanced attacks in real time. Shift Left is an important factor in preventing vulnerabilities, misconfigurations, and software supply chain threats from entering production environments. However, sometimes this security approach is not enough. This has led to a…

Read more

Open source tool "Chain-Bench" for more security
Open source tool "Chain-Bench" for more security

Aqua Security Partners with Center for Internet Security to Introduce First Guide to Security in the Software Supply Chain; Chain-Bench is the first open-source tool to validate the software supply chain to ensure compliance with these new CIS guidelines Aqua Security, the leader in cloud native security, and the Center for Internet Security (CIS), today released the industry's first formal guidelines for software supply chain security. CIS is an independent, non-profit organization dedicated to creating more trust in the connected world. The CIS software…

Read more

Study: CISOs rely on open source and cloud native

As a study by Aqua Security shows: CISOs rely on open source and cloud native. The result shows CISOs' perceptions of cloud native security and open source in IT security. Aqua Security, the leader in pure cloud native security, today released a new study on perceptions of open source solutions and cloud native security. The report is based on a survey of 100 US CISOs (Chief Information Security Officers) at Fortune 1000 companies, commissioned by Aqua Security. The purpose of the study was to increase the understanding and views of...

Read more