Sysdig Site Search
SSH-Snake: New Self-Modifying Worm Threatens Networks
The Sysdig Threat Research Team (TRT) discovered the malicious use of a new network mapping tool called SSH-Snake that was...
“Chain”ging the Game – how runtime makes your supply chain even more secure
There is a lot of information out there (and growing) on software supply chain security. This info covers the basics...
Detecting and Mitigating CVE-2023-4911: Local Privilege Escalation Vulnerability
Recently, Qualys discovered and reported a critical vulnerability affecting the popular GLIBC ecosystem, which is installed by default on most...
Sysdig Boosts AWS Security with the First Automated Inline Scanning for Fargate
Sysdig also adds threat detection using AWS CloudTrail with open source Falco SAN FRANCISCO – September 29, 2020 — Sysdig,...
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker. For Kubernetes, the vulnerabilities...
Understanding common library implementation
The history of successful open source tooling built on common Linux libraries, by Loris Degioanni As Falco grows in popularity,...
Three multi-tenant isolation boundaries of Kubernetes
Many of the benefits of running Kubernetes come from the efficiencies that you get when you share the cluster –...
Sysdig Delivers Industry’s First CNAPP with End-to-End Detection and Response
Introduces agentless cloud detection based on open source Falco, extending CDR beyond workload agents to Cloud, GitHub, and Okta logs...
What’s New in Sysdig – July 2023
“What’s New in Sysdig” is back with the July 2023 edition! My name is Curtis Collicutt, based in Toronto, Canada,...
Happy 10th Birthday Kubernetes!
As Kubernetes celebrates its 10th anniversary, it’s an opportune moment to reflect on the profound impact Kubernetes has had on...