Sysdig Site Search
The Sysdig Cloud Attack Graph – Accelerating Cloud Native Application Protection Platform (CNAPP)
The Rapidly Evolving Cloud Attack Attackers are increasing their focus on the growing cloud playing field as it becomes more...
When Seconds Count: Expanding Real-Time Capabilities Across CNAPP
The last few months at Sysdig have seen incredible product velocity as we accelerate our vision to create the leading...
AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation
The Sysdig Threat Research Team (TRT) has uncovered a novel cloud-native cryptojacking operation which they’ve named AMBERSQUID. This operation leverages...
Ensuring Compliance in an Ever-Evolving Cloud Security Landscape
According to CSO the fines incurred for data breaches or non-compliance with security and privacy laws, for only a handful...
Google’s Vertex AI Platform Gets Freejacked
The Sysdig Threat Research Team (Sysdig TRT) recently discovered a new Freejacking campaign abusing Google’s Vertex AI platform for cryptomining....
Prioritize Vulnerabilities Faster with Checkmarx and Sysdig
Organizations modernizing applications in the cloud find themselves drowning in vulnerabilities. There are too many alerts and not enough time...
Boost Detection and Response with Cybereason and Sysdig
This integration will become a part of Cybereason’s Open XDR initiative to include broader and diverse sources, as well as Sysdig’s push to provide its runtime insights for cloud/containers across to other detection and response partners.
CVSS Version 4.0: What’s New
Over the last decade, many vulnerabilities were initially perceived as critical or high but later deemed less important due to...
Fileless Malware Detection with Sysdig Secure
In today’s digital landscape, cyber threats continue to evolve at an alarming pace, with hackers constantly finding new ways to...
Sysdig Enriched Process Trees, an Innovative Approach to Threat Detection
Discover how Sysdig Secure’s new Process Tree feature improves threat investigation. Imagine you’re investigating a security related detection, the investigation...