Sysdig Site Search
Introducing Sysdig Secure 2.2: Kubernetes auditing, compliance, and access control.
Over the past four years we’ve helped hundreds of organizations run reliable, secure, and compliant Kubernetes and Openshift clusters. Some...
Detecting and Mitigating IngressNightmare – CVE-2025-1974
On Monday, March 24, 2025, a set of critical vulnerabilities affecting the admission controller component of the Ingress NGINX Controller...
CSI Container: Can you DFIR it?
Do you like detective series? Have you ever thought about them actually taking place in cybersecurity? What do you think...
Sending Kubernetes & Docker events to Elasticsearch and Splunk using Sysdig
In this article we are going to see how to aggregate Kubernetes / Docker events and alerts into a centralized...
Detecting and Mitigating Remote Code Execution Exploits in CUPS
What happened? On September 26th, 2024, details were released about several vulnerabilities in the Common Unix Printing System (CUPS) package....
What’s New in Sysdig – May 2024
“What’s New in Sysdig” is back with the May 2024 edition! My name is Dustin Krysak. I’m a Customer Solutions...
Exploring Syscall Evasion – Linux Shell Built-ins
This is the first article in a series focusing on syscall evasion as a means to work around detection by...
CVE-2023-38545: High Severity cURL Vulnerability Detection
On Oct. 11, a new version of curl (8.4.0) was released where a couple of new vulnerabilities were fixed (CVE-2023-38545...
Detecting suspicious activity on AWS using cloud logs
AWS offers a large spectrum of services and compute. The “shared responsibility” model in cloud presents a simplified structure of...
Critical Vulnerability in Spring Core: CVE-2022-22965 a.k.a. Spring4Shell
After the Spring cloud vulnerability reported yesterday, a new vulnerability called Spring4shell CVE-2022-22965 was reported on the very popular Java...