Sysdig Site Search
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker. For Kubernetes, the vulnerabilities...
The Power of Library-Based Vulnerability Detection
With an ever-growing number of vulnerabilities being discovered annually, vulnerability management tools are rapidly evolving to handle and prioritize these...
How to secure your cloud credentials against AndroxGh0st
On January 16, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) sent out...
Vulnerability Prioritization – Combating Developer Fatigue
We are in early 2023, and we have over 2700 new vulnerabilities registered in CVE. It is still a challenge...
Mitigating log4j with Runtime-based Kubernetes Network Policies
A critical vulnerability, CVE-2021-44228 known as “log4shell,” in Apache’s log4j was revealed on December 10th, 2021, and has already seen...
The Hidden Economy of Open Source Software
The recent discovery of a backdoor in XZ Utils (CVE-2024-3094), a data compression utility used by a wide array of...
Are vulnerability scores misleading you? Understanding CVSS score
Vulnerabilities are everywhere. Vetting, mitigating, and remediating them at scale is exhausting for security practitioners. Let’s keep in mind that...
Meet the Research behind our Threat Research Team
The Sysdig Threat Research Team (TRT) is on a mission to help secure innovation at cloud speeds. A group of...
What’s New in Sysdig – November 2022
What’s New in Sysdig is back again with the November 2022 edition! I am Matt Shirilla, an Enterprise Sales Engineer...
What’s New – March 2024
“What’s New in Sysdig” is back with the March 2024 edition! My name is Jonathon Cerda, based in Dallas, Texas,...