Blog
How to Detect SCARLETEEL with Sysdig Secure
The recent SCARLETEEL incident highlights the importance of detecting security threats early in the development cycle. With Terraform state files,…
Search Results 41 - 52 of 134
Blog
The recent SCARLETEEL incident highlights the importance of detecting security threats early in the development cycle. With Terraform state files,…
Blog
Do you like detective series? Have you ever thought about them actually taking place in cybersecurity? What do you think…
Blog
Rule tuning is one of the most important steps during the definition of the security posture. With the detection rules,…
Blog
The name Chaos is being used for a ransomware strain, a remote access trojan (RAT), and now a DDoS malware…
On-Demand Webinar
In this webinar, we will showcase how Sysdig Secure can simplify Kubernetes security by providing out-of-the-box policies and easily digestible events. We will also present a use-case based on the daily administration effort that Kubernetes specialists face and how Sysdig Secure (using Falco) can enable effective security on Kubernetes
Blog
A new network open source tool called graftcp (GitHub page) has been discovered in everyday attacks by the Sysdig Threat…
Blog
This blog will explain how Falco’s Cloudtrail plugin rules can be aligned with MITRE ATT&CK Framework for Cloud. One important…
Blog
Can OpenAI ChatGPT become a contributor for an open source project like Falco? Is this the end of GitHub Copilot?…
Blog
One of the biggest concerns when using Kubernetes is whether we are complying with the security posture and taking into…
Blog
8220 Gang has been dubbed as a group of low-level script kiddies with an equally disappointing name based on their…
Blog
Contributing members of the open source project git deployed a code change in June 2022 that switched the default file…
Blog
The sixth annual Sysdig Cloud-Native Security and Usage Report digs into how Sysdig customers of all sizes and industries are…