Sysdig Site Search
What’s new in Sysdig – January 2022
Welcome to the first update of the year on what’s new from Sysdig. Before starting, once again, Happy New Year,...
Cloud Infrastructure Entitlements Management (CIEM) with Sysdig Secure
Discover what CIEM Security is and how easy it is to implement with Sysdig Secure for cloud. Over-permissioned accounts and...
Top vulnerability assessment and management best practices
Vulnerability assessment and vulnerability management practices are critical to minimizing the exposure and attack surface of your whole infrastructure. We’re...
Sysdig achieves Red Hat Vulnerability Scanner Certification
Image vulnerability scanning is a critical first line of defense for security with containers and Kubernetes. In February 2021, Sysdig...
Sysdig Strengthens Vulnerability Intelligence Reporting with VulnDB Partnership
Every container image protected by Sysdig is tested against VulnDB, the largest database of vulnerability data; remediation steps simplify time-to-resolve...
Detecting cryptomining attacks “in the wild”
Cryptomining attacks are becoming more notable in-line with the rise of blockchain and cryptocurrencies, so detecting cryptomining has become a...
Threat news: Tsunami malware mutated. Now targeting Jenkins and Weblogic services
The Tsunami malware is back! Although it appeared for the first time several years ago, the Sysdig Research Team has...
tj-actions/changed-files with Falco Actions
A compromise (CVE-2025-30066) was discovered in the popular GitHub Action tj-actions/changed-files on March 14, 2025. It impacted tens of thousands...
The Hidden Economy of Open Source Software
The recent discovery of a backdoor in XZ Utils (CVE-2024-3094), a data compression utility used by a wide array of...
Scanning images in Azure Container Registry
Use of container platforms like Azure Kubernetes Service (AKS) is accelerating quickly and driving the need for cloud-native security automation....