http://G2

"Absolutely the best in runtime security!"

http://G2

"Runtime protection leader!"

http://G2

"Sysdig Secure is drop-dead simple to use."

http://G2

"Sysdig Secure is the engine driving our security posture."

http://G2

"Especially strong runtime protection capability!"

Sysdig
  • Products
    • Back to main menu
    • Security
      • Sysdig Secure
        Container, Kubernetes and Cloud Security
    • Observability
      • Sysdig Monitor
        Kubernetes and Prometheus Monitoring
    • Platform – 3rd Column Header – Hidden
      • Integrations
      • Pricing
  • Solutions
    • Back to main menu
    • Security
      • Container & Cloud Security
      • Vulnerability Management
      • Cloud Detection & Response
      • Configuration Management
      • Permissions Management / Least Privilege
    • Observability
      • Kubernetes Monitoring
      • Prometheus Monitoring
      • Custom Metrics
      • Cloud Monitoring
      • Cost Optimization
    • Environments
      • Kubernetes & Containers
      • VMs & Hosts
      • Serverless
      • Amazon Web Services
      • Google Cloud
      • Microsoft Azure
      • IBM Cloud
      • View All
  • Open Source
    • Back to main menu
    • Open Source – 1st Column Header – HIdden
      • Sysdig and Open Source
    • Projects
      • Falco
      • Open Policy Agent
      • Sysdig Open Source
      • Prometheus
  • Customers
  • Resources
    • Back to main menu
    • Resources – 1st Column Header – Hidden
      • Blog
      • Threat Research
    • Education
      • Content Library
      • Events & Webinars
      • Learn Cloud Native
      • Training Portal
    • Topics
      • Container Security
      • Cloud Security
      • Monitoring
      • Compliance
    • Support
      • Support
      • Knowledgebase
      • Documentation
      • Submit a Ticket
      • Sysdig Status
  • Search
    • Back to main menu
    • Best Match
      View all search results
  • Log In
    • Back to main menu
    • Monitor
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • GCP-US-West
    • Secure
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • GCP-US-West
    • Log In – 3rd Column Header – HIdden
      • Support
  • Languages
    • Back to main menu
    • Language Header – Hidden
      • Deutsch
      • English
      • Español
      • Français
      • Italiano
      • 日本
  • Start Free
  • Get Demo
  1. Blog
  2. Stefano Chierici

Stefano Chierici

Cloud Security

Exploiting IAM security misconfigurations

Threat Research, Cloud Security, Kubernetes & Container Security, Sysdig Features

Analysis on Docker Hub malicious images: Attacks through public container images

Blogs by Stefano Chierici

All Topics Cloud Security (7) Compliance (2) Kubernetes & Container Security (12) Monitoring (0) Open Source (8) Sysdig Features (3) Threat Research (17)
Showing 9 of 22
Attacker exploit IAM misconfiguration
Cloud Security

Exploiting IAM security misconfigurations

Stefano Chierici | December 20th, 2022
Analysis of supply chain attacks
Threat Research, Cloud Security, Kubernetes & Container Security, Sysdig Features

Analysis on Docker Hub malicious images: Attacks through public container images

Stefano Chierici | November 23rd, 2022
Cloud Security

Cloud lateral movement: Breaking in through a vulnerable container

Stefano Chierici | July 25th, 2022
container escape - Falco detect capabilities
Kubernetes & Container Security, Threat Research

How to detect the containers’ escape capabilities with Falco

Stefano Chierici | June 21st, 2022
CVE-2022-22965 Spring4Shell
Threat Research

Critical Vulnerability in Spring Core: CVE-2022-22965 a.k.a. Spring4Shell

Stefano Chierici | March 31st, 2022
Threat Research

Detecting and Mitigating CVE-2022-22963: Spring Cloud RCE Vulnerability

Stefano Chierici | March 30th, 2022
Detect okta suspicious events with Falco and Sysdig
Threat Research, Sysdig Features

Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer

Stefano Chierici | March 25th, 2022
CVE-2022-0811 CRI-O
Threat Research, Kubernetes & Container Security, Open Source

Mitigating CVE-2022-0811: Arbitrary code execution affecting CRI-O

Stefano Chierici | March 17th, 2022
CVE-2022-0492 Detect and mitigate privilege escalation
Threat Research

CVE-2022-0492: Privilege escalation vulnerability causing container escape

Stefano Chierici | March 8th, 2022
1 2 3
Back to blog
  • Products
    • Sysdig Secure
    • Sysdig Monitor
  • Partners
    • Sysdig Partners
    • Deal Registration
    • Partner Signup
    • Partner Locator
    • Integrations
  • Company
    • About Us
    • Leadership
    • Careers
    • Newsroom
    • Contact Us
    • Legal
    • Sitemap
  • Support
    • Knowledgebase
    • Documentation
    • Submit a Ticket
    • Sysdig Status
    • Customer Success
    • Twitter
    • Github
    • Slack
    • Youtube
    • LinkedIn
® Copyright 2023 Sysdig, Inc. All Rights Reserved.
  • Privacy Policy
  • Subprocessors
  • Trust Center