Sysdig Site Search
How to secure your cloud credentials against AndroxGh0st
On January 16, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) sent out...
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker. For Kubernetes, the vulnerabilities...
SSH-Snake: New Self-Modifying Worm Threatens Networks
The Sysdig Threat Research Team (TRT) discovered the malicious use of a new network mapping tool called SSH-Snake that was...
Cloud Security and the Power of Runtime Insights
Today’s digital organizations thrive in the cloud. The advantages are undeniable – cost savings, scalability, and seamless access to resources,...
CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils
On March 29th, 2024, a backdoor in a popular package called XZ Utils was announced on the Openwall mailing list....
Cloud Security Regulations in Financial Services
As the financial sector continues to adopt cloud technology, regulatory frameworks such as the updated NIS2 Directive and the Digital...
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
The Sysdig Threat Research Team recently discovered a sophisticated cloud operation in a customer environment, dubbed SCARLETEEL, that resulted in...
Optimizing Wireshark in Kubernetes
In Kubernetes, managing and analyzing network traffic poses unique challenges due to the ephemeral nature of containers and the layered...
CVE-2024-6387 – Shields Up Against RegreSSHion
On July 1st, the Qualys’s security team announced CVE-2024-6387, a remotely exploitable vulnerability in the OpenSSH server. This critical vulnerability...
Sysdig Threat Research Team – Black Hat 2024
The Sysdig Threat Research Team (TRT) is on a mission to help secure innovation at cloud speeds. A group of...