
Aqua Security
-

Aqua Security, a leader in cloud native security, has revealed critical vulnerabilities in six key AWS services, uncovered by its cyber research team, Nautilus. The newly identified flaws had the potential to enable remote code execution (RCE), full-service user takeovers, AI module manipulation, and the exposure of sensitive data, among other serious risks. Following Aqua…
-

Aqua Security, a leader in cloud native security, and Orca Security, known for its agentless cloud security solutions, have announced a strategic partnership. This collaboration aims to provide comprehensive cloud native security through a seamless integration of their respective platforms. The partnership promises significant benefits for joint customers by combining Orca Security’s multi-cloud visibility and…
-

As businesses increasingly integrate Large Language Models (LLMs) into their operations, Aqua Security has announced the launch of new capabilities aimed at safeguarding these advanced applications from emerging security threats. The pioneering cloud native security provider’s latest innovation addresses the unique challenges posed by the deployment of generative AI, ensuring that companies can continue to…
-

By: Michal Lewy Harush, CIO, Aqua Security Looking further into the year 2024, Moshe Weis, CISO, Aqua Security identified three major threats that will continue to be top of mind for security teams globally and in the Asia Pacific region. Worthy of first mention are AI-powered threats and mitigation. This is far from surprising with the increasing adoption of AI in both offensive and defensive cybersecurity strategies. As AI-driven threat actors become more sophisticated, organisations, too must deploy AI-driven…
-

Aqua Security, the leading pure-play cloud native security provider, has published new research from Aqua’s threat research team, Nautilus, that demonstrates attackers are finding new ways to target cloud native environments. The research shows that adversaries are adopting more sophisticated techniques, leveraging multiple attack components and shifting attention to Kubernetes and the software supply chain.…

You must be logged in to post a comment.