Sysdig Site Search
Detecting and Mitigating CVE-2021-25737: EndpointSlice validation enables host network hijack
The CVE-2021-25737 low-level vulnerability has been found in Kubernetes kube-apiserver where an authorized user could redirect pod traffic to private...
Spotting Vulnerabilities at Rest and at Runtime
According to Gartner, 99% of all cloud security failures will fall on the customer. Cloud security risks are complex and constantly evolving. That’s why Sysdig works to help organisations such as Talend, a Qlik Company, to protect their cloud native apps and deployments.
Why Companies Still Struggle with Least Privilege in the Cloud
Vulnerabilities are only one part of the cloud security story. Misconfigurations are still the biggest player in security incidents and,...
Building honeypots with vcluster and Falco: Episode I
Honeypots are, at a high level, mechanisms for luring attackers in order to distract them from legitimate access or to...
Preventing malicious use of Weave Scope
Intezer and Microsoft reported on Sept. 9 that TeamTNT hackers are deploying Weave Scope in compromised systems as an auxiliary...
Sysdig Appoints Suresh Vasudevan as New CEO.
Former CEO of Nimble Storage also joins Sysdig Board of Directors. SAN FRANCISCO — April 24, 2018 — Sysdig, Inc....
Sysdig Grows New Customers by 120%, Appoints New Chief Marketing Officer
Bryce Hein joins as CMO to lead next stage of growth as company extends its leadership in cloud security SAN...
Sysdig Falco, sysdig, and Sysdig Inspect Win InfoWorld Best of Open Source Software Awards.
Honored as “Best Open Source Software for Cloud Computing” category; Recognized as top open source software products for businesses and professional users. September, 27, 2018.
What’s new in Sysdig — April 2025
Sysdig enters a major new chapter this month with full native support for Windows environments, a strategic unification of core...
Detecting CVE-2025-22224 with Falco
The Shadowserver group recently identified over 41,500 internet-exposed VMware ESXi hypervisors vulnerable to CVE-2025-22224, a critical Time-of-Check Time-of-Use (TOCTOU) code...