Security Threats - Aqua https://www.aquasec.com/tag/security-threats/ Cloud Native Security, Container Security & Serverless Security Mon, 15 Jul 2024 08:22:53 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 Linguistic Lumberjack: Understanding CVE-2024-4323 in Fluent Bit https://www.aquasec.com/blog/linguistic-lumberjack-understanding-cve-2024-4323-in-fluent-bit/ Fri, 24 May 2024 22:18:42 +0000 https://www.aquasec.com/?p=20293 Linguistic Lumberjack: Understanding CVE-2024-4323 in Fluent BitLinguistic Lumberjack is a new critical severity vulnerability (CVE-2024-4323) that affects Fluent Bit versions 2.0.7 through 3.0.3. The vulnerability involves a memory corruption error, potentially leading to denial of service, information disclosure, or remote code execution.   Fluent Bit is a highly popular open-source data collector and processor designed for handling large volumes of log data …]]> Employee Personal GitHub Repos Expose Internal Azure and Red Hat Secrets https://www.aquasec.com/blog/github-repos-expose-azure-and-red-hat-secrets/ Thu, 16 May 2024 12:00:48 +0000 https://www.aquasec.com/?p=19994 Employee Personal GitHub Repos Expose Internal Azure and Red Hat SecretsWhat happens when employees at some of the world’s largest organizations like Microsoft and RedHat use personal GitHub repos for their side projects? They can unknowingly expose corporate secrets and credentials opening the doors for a security incident. Unfortunately, this isn’t just a hypothetical situation.   In a recent study, we explained how we analyzed …]]> CVE-2024-3094: Newly Discovered Backdoor in XZ tools https://www.aquasec.com/blog/cve-2024-3094-newly-discovered-backdoor-in-xz-tools/ Mon, 01 Apr 2024 15:49:06 +0000 https://www.aquasec.com/?p=19576 CVE-2024-3094: Newly Discovered Backdoor in XZ toolsThe xz-utils is a popular compression tool used widely across Linux systems, indicating its critical role in the software ecosystem. The xz-utils backdoor, discovered on March 29, 2024, exposes systems to potential backdoor access and remote code execution. It specifically targets versions 5.6.0 and 5.6.1 of xz-utils on systems using glibc, systemd, and patched OpenSSH. …]]> Mitigating Leaky Vessels Vulnerabilities in runc, BuildKit and Moby with Aqua https://www.aquasec.com/blog/mitigating-leaky-vessels-vulnerabilities-in-runc-buildkit-and-moby-with-aqua/ Thu, 01 Feb 2024 17:36:00 +0000 https://www.aquasec.com/?p=17192 Mitigating Leaky Vessels Vulnerabilities in runc, BuildKit and Moby with AquaOn January 31, 2024, researchers revealed the discovery of four severe security vulnerabilities in the container ecosystem. These vulnerabilities, affecting key components including runc, BuildKit, Moby (Docker Engine), and Docker Desktop, pose significant risks to the security and integrity of applications that use containerization applications.   The vulnerabilities become exploitable in scenarios where a user …]]> HeadCrab 2.0: Evolving Threat in Redis Malware Landscape https://www.aquasec.com/blog/headcrab-2-0-evolving-threat-in-redis-malware-landscape/ Mon, 29 Jan 2024 12:04:58 +0000 https://www.aquasec.com/?p=17182 HeadCrab 2.0: Evolving Threat in Redis Malware LandscapeAt the beginning of 2023, Aqua Nautilus researchers uncovered HeadCrab – an advanced threat actor utilizing a state-of-the-art, custom-made malware that compromised 1,200 Redis servers. As you know in the ever-evolving world of cybersecurity, threat actors continually adapt and refine their techniques. Recently, our researchers detected a new version of the HeadCrab malware targeting our …]]> The Gaps in Open Source Governance That Threaten the Software Supply Chain https://www.aquasec.com/blog/the-gaps-in-open-source-governance-that-threaten-the-software-supply-chain/ Tue, 23 Jan 2024 10:56:37 +0000 https://www.aquasec.com/?p=14142 The Gaps in Open Source Governance That Threaten the Software Supply ChainThe widespread issue of unmaintained and deprecated npm packages recently discovered by Aqua researchers affects more than a fifth of open source packages. Presenting yet another silent example of hidden threats to the software supply chain, it demonstrates how poor operational and structural integrity of dependencies can be just as risky as code vulnerabilities, while …]]> Deceptive Deprecation: The Truth About npm Deprecated Packages https://www.aquasec.com/blog/deceptive-deprecation-the-truth-about-npm-deprecated-packages/ Thu, 18 Jan 2024 12:17:13 +0000 https://www.aquasec.com/?p=14080 Deceptive Deprecation: The Truth About npm Deprecated PackagesResearchers at Aqua Nautilus found that 8.2% percent of the most downloaded npm packages are officially deprecated, but due to inconsistent practices in handling package dependencies, the real number is much larger, closer to 21.2%. Moreover, some package maintainers, when confronted with security flaws, deprecate their packages instead of reporting them, getting a CVE assigned …]]> Apache Applications Targeted by Stealthy Attacker https://www.aquasec.com/blog/threat-alert-apache-applications-targeted-by-stealthy-attacker/ Mon, 08 Jan 2024 10:49:54 +0000 https://www.aquasec.com/?p=14157 Apache Applications Targeted by Stealthy AttackerResearchers at Aqua Nautilus have uncovered a new attack targeting Apache Hadoop and Flink applications. This attack is particularly intriguing due to the attacker’s use of packers and rootkits to conceal the malware. The simplicity with which these techniques are employed presents a significant challenge to traditional security defenses. The exploited misconfigurations Apache Hadoop and …]]> The Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secrets https://www.aquasec.com/blog/the-ticking-supply-chain-attack-bomb-of-exposed-kubernetes-secrets/ Tue, 21 Nov 2023 10:59:32 +0000 https://www.aquasec.com/?p=14186 50 Shades of Vulnerabilities: Uncovering Flaws in Open-Source Vulnerability Disclosures https://www.aquasec.com/blog/50-shades-of-vulnerabilities-uncovering-flaws-in-open-source-vulnerability-disclosures/ Wed, 08 Nov 2023 11:05:47 +0000 https://www.aquasec.com/?p=14203 50 Shades of Vulnerabilities: Uncovering Flaws in Open-Source Vulnerability DisclosuresAqua Nautilus researchers evaluated the vulnerability disclosure process for tens of thousands of open-source projects and found flaws in the process. These flaws allowed harvesting the vulnerabilities before they were patched and announced. This could enable attackers to exploit security holes before the project’s users are alerted. By conducting an extensive analysis of commits, pull …]]>