Sysdig Site Search
Discovered new BYOF technique to cryptomining with PRoot
The Sysdig Threat Research Team (TRT) recently discovered threat actors leveraging an open source tool called PRoot to expand the...
5 Steps to Stop the Latest OpenSSL Vulnerabilities: CVE-2022-3602, CVE-2022-3786
The OpenSSL Project team announced two HIGH severity vulnerabilities (CVE-2022-3602, CVE-2022-3786) on Oct. 25, which affect all OpenSSL v3 versions...
Threat news: TeamTNT targeting misconfigured kubelet
TeamTNT is a prevalent threat actor who has been targeting cloud and virtual environments such as Kubernetes and Docker since...
Tackle cloud-native adoption and security hurdles with Coforge and Sysdig
This is a guest blog by Ashu Deep Saxena (Senior Practice Lead, Cloud Modernization, Coforge, a Sysdig GSI partner) with...
Detecting suspicious activity on AWS using cloud logs
AWS offers a large spectrum of services and compute. The “shared responsibility” model in cloud presents a simplified structure of...
Breaking down firewalls with BPFDoor (no e!) – How to detect it with Falco
BPF (not eBPF), typically viewed from a defender/sysadmin’s perspective, provides easy access to network packets and the ability to take...
Getting started with runtime security and Falco
Discover how to get started with Falco to overcome the challenges of implementing runtime security for cloud-native workloads. If you...
K3s + Sysdig: Deploying and securing your cluster… in less than 8 minutes!
As Kubernetes is eating the world, discover an alternative certified Kubernetes offering called K3s, made by the wizards at Rancher....
Securing Google Cloud Run serverless workloads
Google Cloud Run is a serverless compute platform that automatically scales your stateless containers. In this post we are going...
Detecting and mitigating CVE-2024-12084: rsync remote code execution
On Tuesday, January 14, 2025, a set of vulnerabilities were announced that affect the “rsync” utility. rsync allows files and...