Intelligently Utilize Upwind Findings in Your DevSecOps Workflow
We are excited to introduce a new capability, allowing you to seamlessly export Upwind findings into your existing DevSecOps workflows. With this new capability, you can now export Upwind findings into your existing organizational workflow by using a custom webhook to integrate with third-party tooling such as an external SIEM (security information and event management) […]
Easily Identify Internet-Exposed Resources with Upwind’s External Exposure Dashboard
We are excited to announce an exciting new capability for the Upwind Platform – our External Exposure Dashboard. This new dashboard automatically highlights where you are vulnerable and at risk due to your exposure to the Internet, including via exposed assets, open management ports, serverless functions, databases, and object storage. Upwind’s External Exposure Dashboard enables […]
Upwind Named in Top CNAPP Vendors
This week, Upwind was named as the Fastest Growing AppSec Company in the IT-Harvest Cyber 150 by analyst Richard Stiennon, and also received an Innovator Spotlight in Cyber Defense Magazine. Analysts James Berthoty of Latio Tech and Francis Odum of Software Analyst Research also listed Upwind as a leading CNAPP, acknowledging the need for Upwind’s […]
Ask a CPO: Episode 1
Upwind CPO Joshua Burgin discusses how Upwind uses runtime to build a next-generation cloud security platform.
Jenkins Agents Remote Code Execution Vulnerability (CVE-2024-43044)
A critical remote code execution (RCE) vulnerability, identified as CVE-2024-43044, has been discovered in Jenkins, one of the most widely used automation servers. The vulnerability resides in the ClassLoaderProxy#fetchJar method and could allow attackers to compromise Jenkins environments by exploiting unrestricted file path requests from agents to the Jenkins controller. Understanding CVE-2024-43044 CVE-2024-43044 is a […]
Automatically Discover Resource Connections & Behaviors with Upwind’s Orbital View
We are excited to announce Upwind Orbital View – an easy, new way to visualize your most important resource information through holistic inventory mapping and dynamic network analysis, helping you rapidly understand your resources’ behavior and risks. The Upwind Orbital View can be found in the Resource Overview section of the Upwind Topology Map, giving […]
Automatically Correlate Identity Context with Real-Time Container Behaviors
We are excited to announce a new addition to Upwind’s industry-leading container security capabilities, giving you the ability to easily view information about highly privileged identities for every containerized resource in your cloud environment. The Upwind Cloud Security Platform goes beyond traditional CWPP solutions to leverage runtime insights and correlate them with your most important […]
How Adversaries Use Telegram to Evade Detection
In recent years, there has been a significant increase in adversaries exploiting popular messaging apps such as Telegram, Discord, Signal, and others to conceal their malicious activities. Among these platforms, Telegram stands out due to its robust security features, including end-to-end encryption and anonymous account creation, making it a go-to tool for cybercriminals. Overview Most […]
Google Issues Emergency Patch for Chrome Zero-Day (CVE-2024-7965)
Overview On July 30, 2024, a critical zero-day vulnerability (CVE-2024-7965) was discovered in Google Chrome’s V8 JavaScript engine. Google swiftly responded with an emergency patch after confirming that this flaw was being actively exploited in the wild. On August 26, 2024, Google released a new Chrome version addressing this issue that all Chrome users should […]
Understanding Kubernetes Identities Part 2: Escalation Paths
In Kubernetes, understanding identity escalation paths is crucial for managing security risks effectively. This blog post delves into defining highly privileged identities and exploring potential privilege escalation paths using highly privileged permissions. Definition of a Highly Privileged Identity in Kubernetes In Kubernetes, a highly privileged identity refers to entities such as users or service accounts […]