Master Risk Prioritization by Leveraging Insights into Runtime Facts & Critical Cloud Misconfigurations

In today’s increasingly cloud-centric business landscape, securing your cloud environment is crucial. The growth and dynamic nature of attack surfaces often make it difficult for security teams to identify and address their most critical risks, resulting in a lack of clear prioritization and delaying remediation. Upwind’s Cloud Security Platform actively addresses this challenge by leveraging […]

Easily Understand & Intelligently Secure Human & Machine Identities

In the ever changing & complex cloud infrastructure landscape, organizations must not only protect their cloud infrastructure and applications from external threats, but also secure from internal human and machine identities through the practice of Cloud Identity Entitlement Management (CIEM). Managing identities presents multiple challenges, ranging from the need for thorough auditing and generating compliance reports, […]

Detect Suspicious ‘exec’ Commands in kube-system Namespace

We are excited to announce the release of a new threat detection type – exec command in a kube-system namespace. This detection alerts you that kubectl exec has run a command in your environment in the kube-system namespace, which may indicate a suspicious activity.  What is Kubectl Exec? Kubectl is a command line tool used […]

Detect Suspicious Spambot Port 25 Communication

We are excited to announce the release of a new threat detection type – Spambot detection that targets suspicious activity on Port 25. A Spambot detection alerts you that a resource in your environment is abnormally communicating with a remote host most commonly via port 25. What is SMTP? Simple Mail Transfer Protocol (SMTP) is […]

Protect Your Cloud Infrastructure with Upwind’s Support for Amazon ECS

Upwind’s Cloud Security Platform harnesses the power of runtime data to comprehensively secure customers’ infrastructure and applications across multi-cloud and multi-architecture environments.  We are excited to announce that we are extending our infrastructure capabilities to support applications built using the Amazon Elastic Container Service (ECS).  Amazon ECS  is designed to simplify the deployment and management […]

Streamline Automatic Discovery of CI/CD Events from Within the Upwind Platform

We are excited to announce the addition of a significant new capability to the Upwind cloud security platform, automatically streamlining CI/CD events context from your continuous integration or delivery platforms. Upwind Cloud Security Platform offers unprecedented end-to-end visibility of your cloud infrastructure and applications, marrying intelligence from both build time and runtime to quickly prioritize […]

CVE-2024-3094: How to Protect Against the SSHD Backdoor Found in XZ Utilities

CVE: CVE-2024-3094 Affected versions: 5.6.0, 5.6.1 Affected Distributions: Fedora 41, Fedora Rawhide, Alpine, openSUSE, Debian experimental distributions versions 5.5.1alpha-0.1 to 5.6.1-1. On March 29, 2024, CISA warned of a malicious backdoor in the popular data compression software library XZ Utils. The vulnerability has been designated as CVE-2024-3094, and has been assigned a CVSS (Common Vulnerability […]

View API Endpoints and Layer 3, 4 & 7 Traffic on Upwind’s Topology Map

We are excited to announce a new capability that allows you to discover and view API endpoints on Upwind’s infrastructure topology map. We recently launched Upwind API Security, through which you can discover your API catalog, and identify API vulnerabilities and threats. This new capability expands this even further, allowing you to view API endpoints […]

Extending our API Security Support for GraphQL Endpoints

We are excited to announce a significant new capability in our API Security tab, aimed at providing unprecedented visibility into GraphQL-based APIs. GraphQL is an open-source data query and manipulation language for APIs, along with a runtime for executing queries. It’s a powerful alternative to REST that enables efficient and flexible data aggregation from multiple […]