Categories: CVE/vulnerability

Oxeye Identifies Vulnerabilities Cloud Native Applications with CNAST Platform

According to Gartner’s 2021 Magic Quadrant for Application Security Testing, “Modern application design and the continued adoption of DevSecOps are expanding the scope of the AST market. Security and risk management leaders can meet tighter deadlines and test more complex applications by seamlessly integrating and automating AST in the software delivery life cycle.”

Unlike traditional AST, Oxeye’s Cloud Native Application Security Testing Platform (CNAST)identifies code vulnerabilities, open-source vulnerabilities, and secrets to highlight the most critical issues in the software development lifecycle. With this important intelligence, the platform delivers clear guidance for fast and accurate remediation.

Far beyond SAST, DAST, IAST and SCA, the Oxeye CNAST approach is focused on contextual analysis to point out the exploitable vulnerabilities and secrets. This includes analyzing all potential risks, deep mapping of all app components and how they communicate with each other, lightweight fuzzing for active validation and enrichment of the underlying container, cluster and cloud configurations.

Oxeye CNAST is centered on the cloud native segment of the AST market, which is rapidly accelerating as AppSec and DevSecOpsprofessionals scramble to protect more than 500 million cloud-native apps expected to be deployed by 2023. To secure these applications, developers will need to conduct testing and be absolutely sure they remain safe throughout deployment. Oxeye supports scalable, ever-changing environments and automatically adapts to changes for an agile testing scope without changes to code or the need to manually intervene.

Oxeye’s vulnerability profiling helps prioritize the most urgent areas to focus on, leveraging powerful capabilities that include:

  • Complete Cloud Native Application Security Testing for ModernArchitectures – Oxeye analyzes code across microservices to identify code vulnerabilities and other critical issues as part of the software development lifecycle for clear guidance that enables accurate remediation.
  • Multi-Layer/Multi-Service Identification of Exploitable Vulnerabilities –

Provides Runtime Code Analysis without the need for changes to application code, Vulnerable Flow Analysis to detect vulnerabilities across application microservices, and Active Validation with automatic creation and execution of security tests to validate vulnerabilities prior to reporting.

  • Contextual Risk Assessment – Enriches data with infrastructure configuration information from the container, cluster, and cloud layers to calculate risks based on Internet accessibility, sensitive data processing, flawed configuration, etc.
  • Clear Remediation Guidance for Developers – Provides developers with application analysis in runtime to reproduce each step of vulnerability exploitation, delivery of the exact line of code where the vulnerability has been executed, and vulnerability flow visibility for accurate execution flow tracing that allows for fast identification and remediation of actual issues.

“Pieces of code are located literally everywhere throughout cloud-native applications,” said Dean Agron, Co-Founder, and CEO of Oxeye. “The Oxeye platform provides a single unified platform for modern application security testing, providing highly accurate vulnerability testing prior to production. With it, users gain access to the most prominent, automated security risk testing solution for all important stages of software development.”

Pricing and Availability

Oxeye Cloud Native AST will be generally available in Q1, 2022. Oxeye invites IT professionals interested in learning more to visit https://www.oxeye.io/solution or to schedule a personalized demo at https://www.oxeye.io/get-a-demo.

Priya James

Recent Posts

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000 malicious…

1 hour ago

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in Taiwan…

2 hours ago

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords

A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large language…

2 hours ago

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been…

13 hours ago

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government, defense,…

13 hours ago

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of…

13 hours ago