Sysdig Site Search
How Sysdig can detect Impersonation Attacks in Okta IdP
To combat the growing threat of identity attacks, organizations need to adopt a proactive approach that goes beyond traditional security...
The power of prioritization: Why practitioners need CNAPP with runtime insights
The heightened demand for cloud applications places a premium on the agility of development teams to swiftly create and deploy...
Cloud Infrastructure Entitlements Management (CIEM) with Sysdig Secure
Discover what CIEM Security is and how easy it is to implement with Sysdig Secure for cloud. Over-permissioned accounts and...
SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto
SCARLETEEL, an operation reported on by the Sysdig Threat Research Team last February, continues to thrive, improve tactics, and steal...
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
The Sysdig Threat Research Team recently discovered a sophisticated cloud operation in a customer environment, dubbed SCARLETEEL, that resulted in...
MITRE ATT&CK framework for container runtime security with Falco.
MITRE ATT&CK is a comprehensive knowledge base and complex framework of over 200 techniques that adversaries may use over the...
What’s new in Sysdig – March 2022
Welcome to another iteration of What’s New in Sysdig in 2022! The “What’s new in Sysdig” blog has fallen to...
CSI Container: Can you DFIR it?
Do you like detective series? Have you ever thought about them actually taking place in cybersecurity? What do you think...
LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab
The Sysdig Threat Research Team (TRT) recently discovered a new, financially motivated operation, dubbed LABRAT. This operation set itself apart...
What’s New in Sysdig – October 2023
“What’s New in Sysdig” is back with the October 2023 edition! My name is Zain Ghani, based in Austin, Texas,...