Sysdig Site Search
GitHub & Supply Chain Risks
Contributing members of the open source project git deployed a code change in June 2022 that switched the default file...
K8s security guide.
In this K8s security guide we cover the most significant aspects of implementing K8s security best practices. K8s security, like...
Fishing for Miners – Cryptojacking Honeypots in Kubernetes
Introduction A while back, we wrote a blog post about opening an EC2 instance to the world to see who...
Hands-On Muhstik Botnet: crypto-mining attacks targeting Kubernetes
Malware is continuously mutating, targeting new services and platforms. The Sysdig Security Research team has identified the famous Muhstik Botnet...
The art of writing eBPF programs: a primer.
Interested in writing eBPF programs? In this blog, this will be our focus — the process of writing eBPF programs....
Enable Kubernetes Pod Security Policy with kube-psp-advisor.
Kubernetes Pod Security Policy is a mechanism to enforce best security practices in Kubernetes. In this tutorial, we will explain...
Automox Cuts False Positives by 80% and Boosts Vulnerability Response Speed by 30%
Automox uses Sysdig to enhance cloud security, cut false positives by 80%, and streamline IT operations.
How to securely onboard customers during a cloud security solution migration
For a company running an application in the cloud, replacing their security tool comes with a couple of big concerns....
Gini Ensures Adherence to Strict EU Compliance Standards, While Reducing Dev and Ops Burdens
Gini improved compliance and reduced dev/ops burdens by 20–25% with unified visibility across hybrid systems.
Detecting and Mitigating CVE-2022-22963: Spring Cloud RCE Vulnerability
Today, researchers found a new HIGH vulnerability on the famous Spring Cloud Function leading to remote code execution (RCE). The...