A Detailed Analysis of Container Attacks

A-Detailed-Analysis-of-Container-Attacks

Although cloud security companies are trying to provide security features to protect cloud native environments and their customers, recent reports reveal the everyday reality we face at Aqua: Vulnerabilities and security issues will always arise, whether it’s caused by a third party app you use or a misconfiguration your team accidentally caused.
On the other side of the fence, threat actors keep finding novel tactics, techniques and procedures to bypass security tools in order to gain access and attack these environments. Aqua Nautilus, the cybersecurity research team at Aqua Security, is constantly striving to analyze and study these threat actors in order to empower our customers’ security teams and help the community to stop cloud native attacks.
In this paper, we provide a high-level analysis of the latest attack trends and a catalogue of attack scenarios observed by our research team – Aqua Nautilus.
The analysis below refers to various attacks that were observed engaging our honeypot in the period of January 1st through November 1st, 2021.

Facebook
Twitter
LinkedIn
Pinterest

Leave a Reply

Your email address will not be published. Required fields are marked *