Sysdig Site Search
Blackhat 2022 recap – Trends and highlights
Blackhat 2022, on its 25th anniversary, took place this week in Las Vegas. It’s the most important event for the...
Blocking log4j with Response Actions – Sysdig Secure
The situation involving the log4j ( log4shell ) vulnerability has been rapidly evolving since its release a little over a...
The evolution of vulnerability scanning
As application development and deployment evolve, traditional tools alone can no longer handle the dynamic, ephemeral nature of cloud and...
CVSS Version 4.0: What’s New
Over the last decade, many vulnerabilities were initially perceived as critical or high but later deemed less important due to...
Cloud Defense in Depth: Lessons from the Kinsing Malware
In the face of persistent data breaches and escalating cyber threats, organizations are compelled to prioritize cloud defense in depth....
Proxyjacking has Entered the Chat
Did you know that you can effortlessly make a small passive income by simply letting an application run on your...
Vulnerability Prioritization – Combating Developer Fatigue
We are in early 2023, and we have over 2700 new vulnerabilities registered in CVE. It is still a challenge...
The Definitive Guide to Container Security Terminology
The migration to containers, like every major virtualization shift brings many advantages to your business. Your teams can move quicker,...
How attackers use exposed Prometheus server to exploit Kubernetes clusters
You might think that your metrics are harmless from a security point of view. Well, that’s not true, and in...
How to detect TOR network connections with Falco
TOR was created with the idea of anonymizing connections across the Internet, but as in other instances, this can be...