Sysdig Site Search
Introducing Sysdig’s Enhanced Searchable Inventory for Complete Cloud Visibility
See how Sysdig’s improved inventory can help you find your way inside your ever-growing cloud infrastructure with minimal effort. The...
Building honeypots with vcluster and Falco: Episode I
Honeypots are, at a high level, mechanisms for luring attackers in order to distract them from legitimate access or to...
How to secure your cloud credentials against AndroxGh0st
On January 16, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) sent out...
Beat the Clock: Meet the 5/5/5 Detection and Response Benchmark With Sysdig and Tines
10 minutes to pain. When it comes to cloud security, 10 minutes or less is what bad actors need to...
Goldman Sachs: Accelerating Business With Microservices
Organization Chooses Sysdig for Vulnerability Management and Container and Cloud Security
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker. For Kubernetes, the vulnerabilities...
SSH-Snake: New Self-Modifying Worm Threatens Networks
The Sysdig Threat Research Team (TRT) discovered the malicious use of a new network mapping tool called SSH-Snake that was...
Runtime Is The Way
The cloud security market has been totally bizarre ever since it started. Why are we being given a python script...
CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils
On March 29th, 2024, a backdoor in a popular package called XZ Utils was announced on the Openwall mailing list....
Cloud Security Regulations in Financial Services
As the financial sector continues to adopt cloud technology, regulatory frameworks such as the updated NIS2 Directive and the Digital...