http://G2

"Absolutely the best in runtime security!"

http://G2

"Runtime protection leader!"

http://G2

"Sysdig Secure is drop-dead simple to use."

http://G2

"Sysdig Secure is the engine driving our security posture."

http://G2

"Especially strong runtime protection capability!"

Sysdig
  • Products
    • Back to main menu
    • Security
      • Sysdig Secure
        Container, Kubernetes and Cloud Security
    • Observability
      • Sysdig Monitor
        Kubernetes and Prometheus Monitoring
    • Platform – 3rd Column Header – Hidden
      • Integrations
      • Pricing
  • Solutions
    • Back to main menu
    • Security
      • Container & Cloud Security
      • Vulnerability Management
      • Cloud Detection & Response
      • Configuration Management
      • Permissions Management / Least Privilege
    • Observability
      • Kubernetes Monitoring
      • Prometheus Monitoring
      • Custom Metrics
      • Cloud Monitoring
      • Cost Optimization
    • Environments
      • Kubernetes & Containers
      • VMs & Hosts
      • Serverless
      • Amazon Web Services
      • Google Cloud
      • Microsoft Azure
      • IBM Cloud
      • View All
  • Open Source
    • Back to main menu
    • Open Source – 1st Column Header – HIdden
      • Sysdig and Open Source
    • Projects
      • Falco
      • Open Policy Agent
      • Sysdig Open Source
      • Prometheus
  • Customers
  • Resources
    • Back to main menu
    • Resources – 1st Column Header – Hidden
      • Blog
      • Threat Research
    • Education
      • Content Library
      • Events & Webinars
      • Learn Cloud Native
      • Training Portal
    • Topics
      • Container Security
      • Cloud Security
      • Monitoring
      • Compliance
    • Support
      • Support
      • Knowledgebase
      • Documentation
      • Submit a Ticket
      • Sysdig Status
  • Search
    • Back to main menu
    • Best Match
      View all search results
  • Log In
    • Back to main menu
    • Monitor
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • GCP-US-West
    • Secure
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • GCP-US-West
    • Log In – 3rd Column Header – HIdden
      • Support
  • Languages
    • Back to main menu
    • Language Header – Hidden
      • Deutsch
      • English
      • Español
      • Français
      • Italiano
      • 日本
  • Start Free
  • Get Demo
  1. Blog
  2. Jason Avery

Jason Avery

Threat Research, Cloud Security, Sysdig Features

Extortion in Cloud Storage

Kubernetes & Container Security, Open Source, Threat Research

How to use Atomic Red Team to test Falco rules in K8s

Blogs by Jason Avery

All Topics Cloud Security (1) Compliance (0) Kubernetes & Container Security (3) Monitoring (0) Open Source (1) Sysdig Features (1) Threat Research (5)
Showing 5 of 5
Cloud Extortion
Threat Research, Cloud Security, Sysdig Features

Extortion in Cloud Storage

Jason Avery | November 29th, 2022
Secure K8s with Falco and Atomic Red Team
Kubernetes & Container Security, Open Source, Threat Research

How to use Atomic Red Team to test Falco rules in K8s

Jason Avery | May 31st, 2022
CVE-2022-0847 dirty pipe linux privilege escalation
Threat Research, Kubernetes & Container Security

CVE-2022-0847: “Dirty Pipe” Linux Local Privilege Escalation

Jason Avery | March 9th, 2022
CVE-2021-4034 privilege escalation
Threat Research

Detecting and mitigating CVE-2021-4034: “Pwnkit” local privilege escalation

Jason Avery | January 28th, 2022
Detecting CVE-2022-0185 Container escapes
Threat Research, Kubernetes & Container Security

CVE-2022-0185: Detecting and mitigating Linux Kernel vulnerability causing container escape

Jason Avery | January 21st, 2022
Back to blog
  • Products
    • Sysdig Secure
    • Sysdig Monitor
  • Partners
    • Sysdig Partners
    • Deal Registration
    • Partner Signup
    • Partner Locator
    • Integrations
  • Company
    • About Us
    • Leadership
    • Careers
    • Newsroom
    • Contact Us
    • Legal
    • Sitemap
  • Support
    • Knowledgebase
    • Documentation
    • Submit a Ticket
    • Sysdig Status
    • Customer Success
    • Twitter
    • Github
    • Slack
    • Youtube
    • LinkedIn
® Copyright 2023 Sysdig, Inc. All Rights Reserved.
  • Privacy Policy
  • Subprocessors
  • Trust Center