Sysdig Site Search
Threat news: Tsunami malware mutated. Now targeting Jenkins and Weblogic services
The Tsunami malware is back! Although it appeared for the first time several years ago, the Sysdig Research Team has...
The Hidden Economy of Open Source Software
The recent discovery of a backdoor in XZ Utils (CVE-2024-3094), a data compression utility used by a wide array of...
Scanning images in Azure Container Registry
Use of container platforms like Azure Kubernetes Service (AKS) is accelerating quickly and driving the need for cloud-native security automation....
5 things I love about Sysdig
Hello there! I’m Sebastian Zumbado, and I’m currently a DevSecOps Engineer in the Sales Engineer business unit at Sysdig. My...
DDoS-as-a-Service: The Rebirth Botnet
In March 2024, the Sysdig Threat Research Team (TRT) began observing attacks against one of our Hadoop honeypot services from...
What’s New in Kubernetes 1.30?
Kubernetes 1.30 is on the horizon, and it’s packed with fresh and exciting features! So, what’s new in this upcoming...
RUBYCARP: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group
The Sysdig Threat Research Team (Sysdig TRT) recently discovered a long-running botnet operated by a Romanian threat actor group, which...
Cloud Threats Deploying Crypto CDN
The Sysdig Threat Research Team (TRT) discovered a malicious campaign using the blockchain-based Meson service to reap rewards ahead of...
What’s New in Sysdig – January 2024
Happy New Year! My name is Zain Ghani. I’m a Customer Solutions Architect based in Austin, Texas, and I’m excited...
eBPF Offensive Capabilities – Get Ready for Next-gen Malware
It’s not a mystery that eBPF (Extended Berkeley Packet Filter) is a powerful technology, and given its nature, it can...