Sysdig is a Representative Vendor in the 2024 Gartner® Market Guide for CNAPP
Learn More
True cloud investigation in just 5-min. Pro tips from CISO, Matthew Rosenquist
Learn More
Discover the top trends and insights in cloud-native usage and security
Learn More
NEW: Sysdig redefines cloud detection and response with new investigations capabilities
Learn More
Products
Back
Products
Security
Sysdig Secure
CNAPP Powered by Runtime Insights
Observability
Sysdig Monitor
Kubernetes and Prometheus Monitoring
Platform – 3rd Column Header – Hidden
Runtime Insights
AI Workload Security
Sysdig Sage GenAI
Integrations
Pricing
Solutions
Back
Solutions
Security
Cloud Detection & Response
Vulnerability Management
Posture Management
Permissions & Entitlement
Server Threat Detection
Observability
Kubernetes Monitoring
Prometheus Monitoring
Custom Metrics
Cloud Monitoring
Cost Optimization
View All
Environments
Kubernetes & Containers
Serverless
Amazon Web Services
Google Cloud
Microsoft Azure
IBM Cloud
View All
Open Source
Back
Open Source
Open Source – 1st Column Header – HIdden
Sysdig and Open Source
Projects
Falco
Open Policy Agent
Prometheus
Why Sysdig
Back
Why Sysdig
Why Sysdig
About Us
Our Customers
Threat Research Team
5/5/5 Benchmark
2024 Cloud-Native Security & Usage Report
Runtime Insights Ecosystem
Compare Sysdig
Aqua
Crowdstrike
Lacework
Orca
Prisma Cloud
SentinelOne
Wiz
Resources
Back
Resources
Resources – 1st Column Header – Hidden
Blog
Cloud security thought leadership, industry insights, and Sysdig news
Threat Research
Latest threat research and news
Education
Content Library
Events & Webinars
Training Portal
Learn Cloud Native
Newsroom
Topics
Container Security
Cloud Security
Monitoring
Compliance
Support
Support
Sysdig Status
Documentation
Search
Back
Search for:
Search
Best Match
View all search results
Languages
Back
Language
Language Header – Hidden
Deutsch
English
Español
Français
Italiano
日本
Log In
Back
Log In
Monitor
US-East
US-West
EU-Central
AWS-AP-Sydney
GCP-US-West
Secure
US-East
US-West
EU-Central
AWS-AP-Sydney
GCP-US-West
Log In – 3rd Column Header – HIdden
Support
Get Demo
Blog
Michael Clark
Michael Clark
Cloud Security
CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils
Threat Research, Cloud Security
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Blogs by Michael Clark
Filter By:
Cloud Security
CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils
Michael Clark | March 29th, 2024
Threat Research, Cloud Security
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Michael Clark | February 1st, 2024
Threat Research, Cloud Security, Kubernetes & Container Security
Google’s Vertex AI Platform Gets Freejacked
Michael Clark | August 14th, 2023
Threat Research, Cloud Security, Kubernetes & Container Security
2023 Global Cloud Threat Report: Cloud Attacks are Lightning Fast
Michael Clark | August 2nd, 2023
Threat Research, Cloud Security, Kubernetes & Container Security
How global conflicts influenced cyber attack behaviors
Michael Clark | November 30th, 2022
Sysdig Features, Cloud Security, Threat Research
5 Steps to Stop the Latest OpenSSL Vulnerabilities: CVE-2022-3602, CVE-2022-3786
Michael Clark | November 1st, 2022
Threat Research, Kubernetes & Container Security
How the Critical OpenSSL Vulnerability may affect Popular Container Images
Michael Clark | October 28th, 2022
Cloud Security, Kubernetes & Container Security, Open Source, Threat Research
Sysdig 2022 Threat Report: Cloud-native threats are increasing and maturing
Michael Clark | September 28th, 2022
Threat Research
How to be prepared for Cyber Warfare Attacks
Michael Clark | March 24th, 2022
Sysdig Features, Kubernetes & Container Security, Threat Research
Blocking log4j with Response Actions – Sysdig Secure
Michael Clark | December 21st, 2021
Threat Research, Kubernetes & Container Security
Mitigating log4j with Runtime-based Kubernetes Network Policies
Michael Clark | December 13th, 2021
Threat Research
Critical vulnerability in log4j, a widely used logging library
Michael Clark | December 10th, 2021
Back to Blog