Sysdig Site Search
SSH-Snake: New Self-Modifying Worm Threatens Networks
The Sysdig Threat Research Team (TRT) discovered the malicious use of a new network mapping tool called SSH-Snake that was...
“Chain”ging the Game – how runtime makes your supply chain even more secure
There is a lot of information out there (and growing) on software supply chain security. This info covers the basics...
Detecting and Mitigating CVE-2023-4911: Local Privilege Escalation Vulnerability
Recently, Qualys discovered and reported a critical vulnerability affecting the popular GLIBC ecosystem, which is installed by default on most...
Sysdig Boosts AWS Security with the First Automated Inline Scanning for Fargate
Sysdig also adds threat detection using AWS CloudTrail with open source Falco SAN FRANCISCO – September 29, 2020 — Sysdig,...
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker. For Kubernetes, the vulnerabilities...
Three multi-tenant isolation boundaries of Kubernetes
Many of the benefits of running Kubernetes come from the efficiencies that you get when you share the cluster –...
What’s new in Sysdig – October 2020
Welcome to another monthly update on what’s new from Sysdig! CloudTrail support This month, our big announcement was around CloudTrail...
Understanding common library implementation
The history of successful open source tooling built on common Linux libraries, by Loris Degioanni As Falco grows in popularity,...
Happy 10th Birthday Kubernetes!
As Kubernetes celebrates its 10th anniversary, it’s an opportune moment to reflect on the profound impact Kubernetes has had on...