Sysdig Site Search
CSI Container: Can you DFIR it?
Do you like detective series? Have you ever thought about them actually taking place in cybersecurity? What do you think...
Sending Kubernetes & Docker events to Elasticsearch and Splunk using Sysdig
In this article we are going to see how to aggregate Kubernetes / Docker events and alerts into a centralized...
Detecting and Mitigating Remote Code Execution Exploits in CUPS
What happened? On September 26th, 2024, details were released about several vulnerabilities in the Common Unix Printing System (CUPS) package....
What’s New in Sysdig – May 2024
“What’s New in Sysdig” is back with the May 2024 edition! My name is Dustin Krysak. I’m a Customer Solutions...
Exploring Syscall Evasion – Linux Shell Built-ins
This is the first article in a series focusing on syscall evasion as a means to work around detection by...
CVE-2023-38545: High Severity cURL Vulnerability Detection
On Oct. 11, a new version of curl (8.4.0) was released where a couple of new vulnerabilities were fixed (CVE-2023-38545...
Detecting suspicious activity on AWS using cloud logs
AWS offers a large spectrum of services and compute. The “shared responsibility” model in cloud presents a simplified structure of...
Critical Vulnerability in Spring Core: CVE-2022-22965 a.k.a. Spring4Shell
After the Spring cloud vulnerability reported yesterday, a new vulnerability called Spring4shell CVE-2022-22965 was reported on the very popular Java...
How to detect EC2 Serial Console enabled
Recently, Amazon AWS introduced the new feature EC2 Serial Console for instances using Nitro System. It provides a simple and...
Securing Kubernetes clusters with Sysdig and Red Hat Advanced Cluster Management
In this blog, we introduce the new integration between Sysdig Secure and Red Hat® Advanced Cluster Management for Kubernetes that...