Sysdig Site Search
Cloud Security Regulations in Financial Services
As the financial sector continues to adopt cloud technology, regulatory frameworks such as the updated NIS2 Directive and the Digital...
CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils
On March 29th, 2024, a backdoor in a popular package called XZ Utils was announced on the Openwall mailing list....
Beat the Clock: Meet the 555 Detection and Response Benchmark With Sysdig and Tines
10 minutes to pain. When it comes to cloud security, 10 minutes or less is what bad actors need to...
SSH-Snake: New Self-Modifying Worm Threatens Networks
The Sysdig Threat Research Team (TRT) discovered the malicious use of a new network mapping tool called SSH-Snake that was...
How to secure your cloud credentials against AndroxGh0st
On January 16, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) sent out...
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker. For Kubernetes, the vulnerabilities...
Runtime Is The Way
The cloud security market has been totally bizarre ever since it started. Why are we being given a python script...
Introducing Sysdig’s Enhanced Searchable Inventory for complete cloud visibility
See how Sysdig’s improved inventory can help you find your way inside your ever-growing cloud infrastructure with minimal effort. The...
More than an Assistant – A New Architecture for GenAI in Cloud Security
There is no question that cybersecurity is on the brink of an AI revolution. The cloud security industry, for example,...
How to Monitor Your Windows Infrastructure
Nowadays many organizations still rely on classic Windows servers and virtual machines (VMs) for their business applications. Although Kubernetes is...