Sysdig Site Search
Cloud Threats Deploying Crypto CDN
The Sysdig Threat Research Team (TRT) discovered a malicious campaign using the blockchain-based Meson service to reap rewards ahead of...
Strengthening Cyberattack Preparedness Through Identity Threat Detection and Response (ITDR)
This webinar delves into how the adaptable plugin architecture of the open-source Falco empowers security responders to expand their system call event detection capabilities to encompass auditing events originating from identity systems like Okta.
Terraform Security Best Practices
Terraform is the de facto tool if you work with infrastructure as code (IaC). Regardless of the resource provider, it...
A Hacker’s Secrets to Ethically Cracking the Code in Today’s Digital World with Dr. Charlie Miller
Join us for a fireside chat with renowned ‘White Hat’ hacker, Dr. Charlie Miller. He will share details about his own behind-the-scenes journeys and how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk.
Dig Deeper! Prioritize Cloud Vulnerabilities and Reduce Container Spending
Bad actors will find a way into your infrastructure whether through traditional approaches like misconfigurations and vulnerabilities; or more advanced approaches such as exploiting your supply chain, impersonating a user with stolen credentials, cloud entitlements, or other techniques.
Sysdig 2022 Threat Report: Cloud-native threats are increasing and maturing
The first annual cloud-native threat report from Sysdig explores some of the year’s most important security topics in the cloud....
The Quiet Victories and False Promises of Machine Learning in Security
Contrary to what you might have read on the Internet, machine learning (ML) is not magic pixie dust. It’s a...
Cryptominer detection: a Machine Learning approach
Cryptominers are one of the main cloud threats today. Miner attacks are low risk, low effort, and high reward for...
How to detect the containers’ escape capabilities with Falco
Attackers use container escape techniques when they manage to control a container so the impact they can cause is much...
Breaking down firewalls with BPFDoor (no e!) – How to detect it with Falco
BPF (not eBPF), typically viewed from a defender/sysadmin’s perspective, provides easy access to network packets and the ability to take...