Sysdig Site Search
Hands-On Muhstik Botnet: crypto-mining attacks targeting Kubernetes
Malware is continuously mutating, targeting new services and platforms. The Sysdig Security Research team has identified the famous Muhstik Botnet...
The art of writing eBPF programs: a primer.
Interested in writing eBPF programs? In this blog, this will be our focus — the process of writing eBPF programs....
Enable Kubernetes Pod Security Policy with kube-psp-advisor.
Kubernetes Pod Security Policy is a mechanism to enforce best security practices in Kubernetes. In this tutorial, we will explain...
Automox Cuts False Positives by 80% and Boosts Vulnerability Response Speed by 30%
Automox uses Sysdig to enhance cloud security, cut false positives by 80%, and streamline IT operations.
How to securely onboard customers during a cloud security solution migration
For a company running an application in the cloud, replacing their security tool comes with a couple of big concerns....
Gini Ensures Adherence to Strict EU Compliance Standards, While Reducing Dev and Ops Burdens
Gini improved compliance and reduced dev/ops burdens by 20–25% with unified visibility across hybrid systems.
Detecting and Mitigating CVE-2022-22963: Spring Cloud RCE Vulnerability
Today, researchers found a new HIGH vulnerability on the famous Spring Cloud Function leading to remote code execution (RCE). The...
Sysdig Welcomes Gerald and the Wireshark Community
Today, I’m excited to announce that Gerald Combs, the original creator and lead maintainer of Wireshark, has joined Sysdig. In...
What’s new in Kubernetes 1.13?
Looking forward to the new Kubernetes 1.13 features? At Sysdig we follow Kubernetes development closely and here we bring you...
Strengthen LLMs with Sysdig Secure
The term LLMjacking refers to attackers using stolen cloud credentials to gain unauthorized access to cloud-based large language models (LLMs),...