Sysdig Site Search
How to secure your cloud credentials against AndroxGh0st
On January 16, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) sent out...
Sysdig Threat Research Team – Black Hat 2024
The Sysdig Threat Research Team (TRT) is on a mission to help secure innovation at cloud speeds. A group of...
Mitigating log4j with Runtime-based Kubernetes Network Policies
A critical vulnerability, CVE-2021-44228 known as “log4shell,” in Apache’s log4j was revealed on December 10th, 2021, and has already seen...
LLMjacking: Stolen Cloud Credentials Used in New AI Attack
The Sysdig Threat Research Team (TRT) recently observed a new attack that leveraged stolen cloud credentials in order to target...
Are vulnerability scores misleading you? Understanding CVSS score
Vulnerabilities are everywhere. Vetting, mitigating, and remediating them at scale is exhausting for security practitioners. Let’s keep in mind that...
Meet the Research behind our Threat Research Team
The Sysdig Threat Research Team (TRT) is on a mission to help secure innovation at cloud speeds. A group of...
What’s New – March 2024
“What’s New in Sysdig” is back with the March 2024 edition! My name is Jonathon Cerda, based in Dallas, Texas,...
What’s New in Sysdig – November 2022
What’s New in Sysdig is back again with the November 2022 edition! I am Matt Shirilla, an Enterprise Sales Engineer...
What’s New in Sysdig – March & April 2023
“What’s New in Sysdig” is back with the March and April 2023 edition! Happy International Women’s Day! Happy St. Patrick’s...
OWASP Kubernetes Top 10
One of the biggest concerns when using Kubernetes is whether we are complying with the security posture and taking into...