Blog
Wireshark: Ethereal Network Analysis for the Cloud SOC
Remember Wireshark from the good old days of your IT degree or early engineering adventures? Well, guess what? It’s still…
Search Results 11 - 22 of 133
Blog
Remember Wireshark from the good old days of your IT degree or early engineering adventures? Well, guess what? It’s still…
Blog
“What’s New in Sysdig” is back with the May 2024 edition! My name is Dustin Krysak. I’m a Customer Solutions…
Blog
In Kubernetes, managing and analyzing network traffic poses unique challenges due to the ephemeral nature of containers and the layered…
Blog
The recent discovery of a backdoor in XZ Utils (CVE-2024-3094), a data compression utility used by a wide array of…
Blog
This is part two in our series on building honeypots with Falco, vcluster, and other assorted open source tools. For…
Blog
Hey there! I’m Devin Limo, a Senior Customer Solutions Architect here at Sysdig. February was a whirlwind, and we’ve got…
Blog
DIE is the notion that an immutable workload should not change during runtime; therefore, any observed change is potentially evident…
Blog
The Sysdig Threat Research Team (TRT) discovered the malicious use of a new network mapping tool called SSH-Snake that was…
Blog
The Sysdig Threat Research Team (TRT) published their latest Cloud-Native Security & Usage Report for 2024. As always, the research…
Blog
This is the first article in a series focusing on syscall evasion as a means to work around detection by…
Brief
Blog
The cybersecurity landscape is undergoing a significant shift, moving from security tools monitoring applications running within userspace to advanced, real-time…