Sysdig Site Search
Optimizing Wireshark in Kubernetes
In Kubernetes, managing and analyzing network traffic poses unique challenges due to the ephemeral nature of containers and the layered...
OWASP Kubernetes Top 10
One of the biggest concerns when using Kubernetes is whether we are complying with the security posture and taking into...
Auditing container activity – A real example with wget and curl using Sysdig Secure.
One of the first questions Sysdig Secure and Sysdig Falco users have is how do I audit container activity or...
The Hidden Economy of Open Source Software
The recent discovery of a backdoor in XZ Utils (CVE-2024-3094), a data compression utility used by a wide array of...
What’s new in Sysdig – April 2021
Welcome to another monthly update on what’s new from Sysdig. Ramadan Kareem to all observing the holy month of Ramadan....
How to Prevent a DDoS Attack
If you want to learn how to prevent a DDoS attack in your cloud environment by detecting the early signs...
Sending little bobby tables to detention
Little Bobby Tables shows us why it’s a good idea to sanitize your database inputs to avoid SQL injection attacks:...
What’s New in Sysdig – May and June 2023
“What’s New in Sysdig” is back with the May and June 2023 edition! Happy Mother’s Day! Feliz Cinco de Mayo!...
Ephemeral Containers and APTs
The Sysdig Threat Research Team (TRT) published their latest Cloud-Native Security & Usage Report for 2024. As always, the research...
THREAT ALERT: Crypto miner attack – Sysrv-Hello Botnet targeting WordPress pods
The Sysdig Security Research team has identified a Cryptominer attack hitting a Kubernetes pod running WordPress, related to the recent...