2025 Cloud-Native Security and Usage Report: How are enterprises advancing their security?  READ NOW Customers rate Sysdig top CNAPP in Customers' Choice category within Gartner® VOC report  LEARN MORE
Sysdig logo Sysdig Home
Sysdig logo
  • Platform
    • Back
    • Platform
    • Platform
      • Sysdig Secure
        CNAPP powered by runtime insights
      • Environments
      • Integrations
      • Sysdig Monitor
    • Powered By
      • Falco
        The core engine providing runtime insights to the Sysdig platform
    • hidden header
      • Sysdig Sage™ GenAI
        AI cloud security analyst with multi-step reasoning
    • SysDig 555 logo555 Benchmark
      Detect and respond to cloud attacks faster than attackers can complete them
  • Solutions
    • Back
    • Solutions
    • Real-time Cloud Security
      • Cloud-Native Application Protection Platform
        Unified cloud security to protect your cloud, containers, and workloads
      • AI Workload Security
        Detect, prioritize, and remediate active AI risk
      • Cloud Detection & Response
        Detect, investigate, and respond to threats at cloud speed
    • From Prevention to Detection & Response
      • Cloud Workload Protection
      • Vulnerability Management
      • checklist icon
        Cloud Security Posture Management
      • Cloud Identity & Entitlement Management
    • hidden
      • Container & Kubernetes Security
      • Server Threat Detection & Response
      • Infrastructure as Code Security
    • Falco logoCloud Security Requires Runtime Insights
      Real-time visibility for detection and response and rich context to prioritize what matters most
  • Company
    • Back
    • Company
    • Why Sysdig
      • Our Customers
        Hear how our customers secure and accelerate innovation in the cloud
      • Runtime Insights
        Learn how runtime insights powers real-time cloud security
      • Threat Research Team
        Get the latest threat research and security findings
    • About Sysdig
      • Who We Are
      • Leadership Team
      • Newsroom
    • Compare Sysdig
      • Aqua
      • Crowdstrike
      • Lacework
      • Orca
      • Prisma Cloud
      • SentinelOne
      • Wiz
    • Headshot of Dan Holden, VP of Cybersecurity at BigCommerceCustomer Spotlight
      BigCommerce achieves real-time cloud security
  • Open Source
    • Back
    • Open Source
    • OSS
      • Sysdig & OSS
        The future of security is open
    • Projects
      • Falco
        Detect threats in real time
      • Falco Feeds by Sysdig
        Enterprise detection rules for Falco users
      • Stratoshark
        Analyze, troubleshoot, and secure cloud environments
    • hidden
      • Open Policy Agent
        Unify policy enforcement for cloud-native environments
      • Prometheus
        Monitor cloud-native applications and Kubernetes
    • Headshot of Loris Degioanni - CTO and founder of SysdigWhy Open Source Matters
      Falco’s journey to CNCF graduation
  • Resources
    • Back
    • Resources
    • Learn
      • Blog
        Get the latest news and insights from cloud security experts
      • Learn Cloud Native
        Learn cloud and container security fundamentals
      • Content Library
        Explore cloud and container security content
    • Engage
      • Webinars & Workshops
      • Events
      • Contact Us
    • Get Support
      • Contact Support
      • Sysdig Status
      • Docs
    • Sysdig Threat Research thumbnailSysdig Threat Research
      Security research focused on the latest cloud-native security threats, vulnerabilities, and attack patterns
  • Search
    • Back
    • Best Match
      View all search results
  • Languages
    • Back
    • Language
    • Language Header – Hidden
      • Deutsch
      • English
      • Español
      • Français
      • Italiano
      • 日本語
  • Log In
    • Back
    • Log In
    • Monitor
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • AWS-AP-South
      • GCP-US-West
    • Secure
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • AWS-AP-South
      • GCP-US-West
    • Log In – 3rd Column Header – HIdden
      • Support
  • Get Demo
  • SysDig 555 logo555 Benchmark
    Detect and respond to cloud attacks faster than attackers can complete them
  1. Blog
  2. Daniella Pontes

Daniella Pontes

Sysdig Features, Threat Research

Using Sysdig Secure to Detect and Prioritize Mitigation of CVE 2022-3602 & CVE 2022-3786: OpenSSL 3.0.7

Sysdig Features, Kubernetes & Container Security, Threat Research

Detect cryptojacking with Sysdig’s high-precision machine learning

Blogs by Daniella Pontes

Filter By:
Grey background with the word OpenSSL: Detect and Mitigate CVE-2022-3786 & CVE-2022-3602 in white written on top
Sysdig Features, Threat Research

Using Sysdig Secure to Detect and Prioritize Mitigation of CVE 2022-3602 & CVE 2022-3786: OpenSSL 3.0.7

Daniella Pontes | November 10th, 2022
malware detection machine learning Sysdig
Sysdig Features, Kubernetes & Container Security, Threat Research

Detect cryptojacking with Sysdig’s high-precision machine learning

Daniella Pontes | August 10th, 2022
Sysdig Features, Kubernetes & Container Security

Preventing container runtime attacks with Sysdig’s Drift Control

Daniella Pontes | June 28th, 2022
Cloud Security, Kubernetes & Container Security

Ten considerations for securing cloud and containers

Daniella Pontes | May 5th, 2022
Cloud Security, Kubernetes & Container Security

Preventing cloud and container vulnerabilities

Daniella Pontes | April 21st, 2022
Eliminate noise Risk Spotlight
Kubernetes & Container Security, Sysdig Features

Eliminate noise and prioritize the vulnerabilities that really matter with Risk Spotlight

Daniella Pontes | April 20th, 2022
Cloud Security, Kubernetes & Container Security

Understanding cloud security

Daniella Pontes | April 7th, 2022
featured image EDR Sysdig rapid resoponse
Sysdig Features, Cloud Security, Kubernetes & Container Security

Endpoint Detection and Response (EDR) for containers and Kubernetes – Sysdig Secure

Daniella Pontes | January 19th, 2022
Top 10 indicators of compromise
Sysdig Features, Kubernetes & Container Security

Top 10 Indicators of Compromise in Kubernetes

Daniella Pontes | September 1st, 2021
Back to Blog
  • Products
    • Sysdig Secure
    • Sysdig Monitor
  • Partners
    • Sysdig Partners
    • Partner Signup
    • Partner Locator
    • Integrations
    • Partner Portal
  • Company
    • About Us
    • Leadership
    • Careers
    • Newsroom
    • Contact Us
    • Legal
    • Sitemap
  • Support
    • Support
    • Sysdig Status
    • Documentation
    • Customer Success
  • Social
    • X (Formerly Twitter) logoTwitter
    • Github logoGithub
    • Slack logoSlack
    • YouTube logoYoutube
    • LinkedIn logoLinkedIn

Sysdig logo
  • ® Copyright 2025 Sysdig, Inc.
  • Privacy Policy
  • Privacy Choices
  • Subprocessors
  • Trust Center
  • Change Consent