blogs
Insights at Cloud Speed

Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
Alberto Pellitteri
|
November 24, 2025
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories

Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns
Alberto Pellitteri and Michael Clark
|
November 20, 2025
Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns

What’s old is new again: How to demystify AI security with AIBOMs
Crystal Morin
|
November 20, 2025
What’s old is new again: How to demystify AI security with AIBOMs

How Falco and Stratoshark close the gap between open source runtime detection and deep forensic analysis
Gerald Combs
|
November 10, 2025
How Falco and Stratoshark close the gap between open source runtime detection and deep forensic analysis
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
November 24, 2025
Alberto Pellitteri
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
Threat Research

Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns
November 20, 2025
Alberto Pellitteri and Michael Clark
Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns
Threat Research

What’s old is new again: How to demystify AI security with AIBOMs
November 20, 2025
Crystal Morin
What’s old is new again: How to demystify AI security with AIBOMs
Cloud Security
Security for AI

Securing Kubernetes with agentic cloud security
November 19, 2025
Eric Carter
Securing Kubernetes with agentic cloud security
Kubernetes & Container Security
AI for cloud security

How agentic cloud security reduces real risks
November 17, 2025
Eric Carter
How agentic cloud security reduces real risks
Cloud Security
AI for cloud security

Hunting Reverse Shells: How the Sysdig Threat Research Team builds smarter detection rules
November 13, 2025
Alberto Pellitteri
Hunting Reverse Shells: How the Sysdig Threat Research Team builds smarter detection rules
Threat Research
Cloud Security
