Sysdig is a Representative Vendor in the 2024 Gartner® Market Guide for CNAPP
Learn More
True cloud investigation in just 5-min. Pro tips from CISO, Matthew Rosenquist
Learn More
Discover the top trends and insights in cloud-native usage and security
Learn More
NEW: Sysdig redefines cloud detection and response with new investigations capabilities
Learn More
Products
Back
Products
Security
Sysdig Secure
CNAPP Powered by Runtime Insights
Observability
Sysdig Monitor
Kubernetes and Prometheus Monitoring
Platform – 3rd Column Header – Hidden
Runtime Insights
AI Workload Security
Sysdig Sage GenAI
Integrations
Pricing
Solutions
Back
Solutions
Security
Cloud Detection & Response
Vulnerability Management
Posture Management
Permissions & Entitlement
Server Threat Detection
Observability
Kubernetes Monitoring
Prometheus Monitoring
Custom Metrics
Cloud Monitoring
Cost Optimization
View All
Environments
Kubernetes & Containers
Serverless
Amazon Web Services
Google Cloud
Microsoft Azure
IBM Cloud
View All
Open Source
Back
Open Source
Open Source – 1st Column Header – HIdden
Sysdig and Open Source
Projects
Falco
Open Policy Agent
Prometheus
Why Sysdig
Back
Why Sysdig
Why Sysdig
About Us
Our Customers
Threat Research Team
5/5/5 Benchmark
2024 Cloud-Native Security & Usage Report
Runtime Insights Ecosystem
Compare Sysdig
Aqua
Crowdstrike
Lacework
Orca
Prisma Cloud
SentinelOne
Wiz
Resources
Back
Resources
Resources – 1st Column Header – Hidden
Blog
Cloud security thought leadership, industry insights, and Sysdig news
Threat Research
Latest threat research and news
Education
Content Library
Events & Webinars
Training Portal
Learn Cloud Native
Newsroom
Topics
Container Security
Cloud Security
Monitoring
Compliance
Support
Support
Sysdig Status
Documentation
Search
Back
Search for:
Search
Best Match
View all search results
Languages
Back
Language
Language Header – Hidden
Deutsch
English
Español
Français
Italiano
日本
Log In
Back
Log In
Monitor
US-East
US-West
EU-Central
AWS-AP-Sydney
GCP-US-West
Secure
US-East
US-West
EU-Central
AWS-AP-Sydney
GCP-US-West
Log In – 3rd Column Header – HIdden
Support
Get Demo
Blog
Stefano Chierici
Stefano Chierici
Threat Research, Cloud Security
Sysdig Threat Research Team – Black Hat 2024
Threat Research
Cloud Threats Deploying Crypto CDN
Blogs by Stefano Chierici
Filter By:
Threat Research, Cloud Security
Sysdig Threat Research Team – Black Hat 2024
Stefano Chierici | July 22nd, 2024
Threat Research
Cloud Threats Deploying Crypto CDN
Stefano Chierici | March 11th, 2024
Kubernetes & Container Security, Cloud Security, Sysdig Features, Threat Research
CSI Container: Can you DFIR it?
Stefano Chierici | March 28th, 2023
Cloud Security
Exploiting IAM security misconfigurations
Stefano Chierici | December 20th, 2022
Threat Research, Cloud Security, Kubernetes & Container Security, Sysdig Features
Analysis on Docker Hub malicious images: Attacks through public container images
Stefano Chierici | November 23rd, 2022
Cloud Security
Cloud lateral movement: Breaking in through a vulnerable container
Stefano Chierici | July 25th, 2022
Kubernetes & Container Security, Threat Research
How to detect the containers’ escape capabilities with Falco
Stefano Chierici | June 21st, 2022
Threat Research
Critical Vulnerability in Spring Core: CVE-2022-22965 a.k.a. Spring4Shell
Stefano Chierici | March 31st, 2022
Threat Research
Detecting and Mitigating CVE-2022-22963: Spring Cloud RCE Vulnerability
Stefano Chierici | March 30th, 2022
Threat Research, Sysdig Features
Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer
Stefano Chierici | March 25th, 2022
Threat Research, Kubernetes & Container Security, Open Source
Mitigating CVE-2022-0811: Arbitrary code execution affecting CRI-O
Stefano Chierici | March 17th, 2022
Threat Research
CVE-2022-0492: Privilege escalation vulnerability causing container escape
Stefano Chierici | March 8th, 2022
Back to Blog