Sysdig Site Search
Fileless malware mitigation
As detection methodologies advance, attackers are increasingly using more complex techniques such as fileless malware. In the following article, we...
Prometheus 2.37 – The first long-term supported release!
Prometheus 2.37 is out and brings exciting news: this is the first long-term supported release. It’ll be supported for at...
Sysdig Welcomes Gerald and the Wireshark Community
Today, I’m excited to announce that Gerald Combs, the original creator and lead maintainer of Wireshark, has joined Sysdig. In...
No pain… More gain! Sysdig Monitor radically simplifies monitoring integrations based on open source
Monitoring services and applications in just a few clicks – that’s the dream of every SRE and developer, but this...
Sending little bobby tables to detention
Little Bobby Tables shows us why it’s a good idea to sanitize your database inputs to avoid SQL injection attacks:...
A universal Slack event router
It’s no secret that more and more teams nowadays live on Slack. Discussions, internal and external events, application notifications are...
Proxyjacking has Entered the Chat
Did you know that you can effortlessly make a small passive income by simply letting an application run on your...
Monitoring Java in Docker: Overcoming past limitations
Before the release of Java 9 and 10, there were several limitations to deploying and monitoring Java in Docker. This...
Bypassing Network Detection with Graftcp
A new network open source tool called graftcp (GitHub page) has been discovered in everyday attacks by the Sysdig Threat...
Discovered new BYOF technique to cryptomining with PRoot
The Sysdig Threat Research Team (TRT) recently discovered threat actors leveraging an open source tool called PRoot to expand the...