Proactively Secure Your Kubernetes With Upwind’s Vulnerability Management
Upwind’s runtime vulnerability management leverages real-time, runtime insights and correlates them with CI/CD and DevOps context, giving you end-to-end visibility and protection for Kubernetes and associated workloads. Upwind’s vulnerability management intelligently prioritizes your most critical vulnerabilities based on real environmental factors, cutting out around 95% of alert noise to focus on the risks that pose […]
Identify Emerging Vulnerabilities & Threats in Your Environment With Upwind’s Security Feed
We are excited to announce the release of the Upwind Security Feed – a native feed accessible from directly within the Upwind platform, providing you with constantly updated information about new and emerging attacks, zero days, and security trends that are relevant to your environment and should be investigated further. The Upwind Security Research team […]
Deep Dive: CVE-2024-37902 and Potential Impact on DeepJavaLibrary Users
AWS announced today, June 17, that there is a potential security issue with archive extraction utilities in DeepJavaLibrary versions 0.1.0 through 0.27.0 that could allow an attacker to tamper with your system. What is DeepJavaLibrary? DJL is a free, open-source library by AWS used for building deep learning models in Java. It provides easy-to-use tools […]
Prioritize & Eliminate Critical Risks with Upwind
Upwind brings a new approach that redefines the speed, visibility and actionability of cloud security, cutting 95% of alert noise to help you focus on your most critical risks. The Upwind Cloud Security Platform gives you the ability to: Accelerate productivity and empower your Dev, Security, and DevOps teams to innovate within a secure & […]
Master Risk Prioritization by Leveraging Insights into Runtime Facts & Critical Cloud Misconfigurations
In today’s increasingly cloud-centric business landscape, securing your cloud environment is crucial. The growth and dynamic nature of attack surfaces often make it difficult for security teams to identify and address their most critical risks, resulting in a lack of clear prioritization and delaying remediation. Upwind’s Cloud Security Platform actively addresses this challenge by leveraging […]
Evaluate Your Vulnerability Resolution Over Time
We are excited to announce a new section in the Upwind Platform – the Vulnerability Dashboard. The Vulnerability Dashboard will give you the ability to see both an overview of your current critical vulnerabilities and the state of your vulnerabilities over time. Get an instant overview of your current vulnerabilities, including: The Vulnerability Dashboard will […]
Upwind takes over ArgoCD and an EKS Cluster Using Only A Simple CSRF Vulnerability
In recent weeks, Upwind’s research team dug into Argo CD, our research revealed two batches of vulnerabilities, specifically critical security vulnerabilities in Argo CD, including Cross-Site Request Forgery (CSRF) impacting GET, POST, and PUT requests, and Remote Code Execution (RCE) capabilities. These vulnerabilities opened doors to unauthorized exposure and manipulation of sensitive data within Kubernetes […]
Reduce Attack Surfaces with Distroless Images – Part 1
Upwind pioneered a method to streamline patch management and significantly reduce vulnerabilities for Upwind users through leveraging runtime data. When it’s challenging to eliminate unneeded binaries and artifacts from applications, there are two strategies available: Both approaches aim to minimize image size and reduce the attack surface, while Distroless images require no patching, no upgrading […]
Visualize Internet Exposure Paths in Real-Time
We are excited to announce a new capability – real-time Internet exposure path visualization. This new capability visualizes exposure paths from the Internet for AWS resources, showing you the entire exposure path through Internet gateways, routing tables, security groups and load balancers. This gives you the ability to identify attack paths and better prioritize vulnerabilities […]
Runtime-based Risk Augmentation in Your Cloud Infrastructure Topology
We’re excited to announce a major capability in our runtime topology map that will now include risk overview context icons and new filter capabilities. Using these new capabilities, you can view each resource’s risk overview at a glance with built-in icons on the topology map. This allows you to rapidly filter and locate at-risk resources […]