Sysdig Site Search
CVE-2024-6387 – Shields Up Against RegreSSHion
On July 1st, the Qualys’s security team announced CVE-2024-6387, a remotely exploitable vulnerability in the OpenSSH server. This critical vulnerability...
Optimizing Wireshark in Kubernetes
In Kubernetes, managing and analyzing network traffic poses unique challenges due to the ephemeral nature of containers and the layered...
Cloud Security Regulations in Financial Services
As the financial sector continues to adopt cloud technology, regulatory frameworks such as the updated NIS2 Directive and the Digital...
CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils
On March 29th, 2024, a backdoor in a popular package called XZ Utils was announced on the Openwall mailing list....
SSH-Snake: New Self-Modifying Worm Threatens Networks
The Sysdig Threat Research Team (TRT) discovered the malicious use of a new network mapping tool called SSH-Snake that was...
Cloud Security and the Power of Runtime Insights
Today’s digital organizations thrive in the cloud. The advantages are undeniable – cost savings, scalability, and seamless access to resources,...
How to secure your cloud credentials against AndroxGh0st
On January 16, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) sent out...
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker. For Kubernetes, the vulnerabilities...
Introducing Sysdig’s Enhanced Searchable Inventory for complete cloud visibility
See how Sysdig’s improved inventory can help you find your way inside your ever-growing cloud infrastructure with minimal effort. The...
What’s New in Sysdig – August 2023
“What’s New in Sysdig” is back with the August 2023 edition! My name is Jonathon Cerda, based in Dallas, Texas,...