Sysdig Site Search
How to secure your cloud credentials against AndroxGh0st
On January 16, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) sent out...
GitHub & Supply Chain Risks
Contributing members of the open source project git deployed a code change in June 2022 that switched the default file...
Are vulnerability scores misleading you? Understanding CVSS score
Vulnerabilities are everywhere. Vetting, mitigating, and remediating them at scale is exhausting for security practitioners. Let’s keep in mind that...
Announcing Falco 0.4.0
Falco Release 0.4.0 Yesterday we released Falco 0.4.0. It’s been a couple of months since 0.3.0, but there are lots...
CVE-2022-0185: Detecting and mitigating Linux Kernel vulnerability causing container escape
This week, Linux maintainers and vendors disclosed a heap overflow vulnerability in the Linux Kernel. The vulnerability has been issued...
Detecting MITRE ATT&CK: Privilege escalation with Falco
The privilege escalation category inside MITRE ATT&CK covers quite a few techniques an adversary can use to escalate privileges inside...
Understanding Kubernetes Limits and Requests
When working with containers in Kubernetes, it’s important to know what are the resources involved and how they are needed....
K8s security guide.
In this K8s security guide we cover the most significant aspects of implementing K8s security best practices. K8s security, like...
Run Faster, Runtime Followers
Recently, there has been a flurry of announcements claiming to have what we call Runtime Insights, the ability to prioritize...
Kubernetes capacity planning: How to rightsize the requests of your cluster
Kubernetes capacity planning is one of the main challenges that infrastructure engineers have to face, as understanding Kubernetes limits and...