background graphic

Sysdig Site Search

Showing 121-130 of 488

Ephemeral Containers and APTs

Blog

The Sysdig Threat Research Team (TRT) published their latest Cloud-Native Security & Usage Report for 2024. As always, the research...

THREAT ALERT: Crypto miner attack – Sysrv-Hello Botnet targeting WordPress pods

Blog

The Sysdig Security Research team has identified a Cryptominer attack hitting a Kubernetes pod running WordPress, related to the recent...

Understanding and mitigating CVE-2020-8566: Ceph cluster admin credentials leaks in kube-controller-manager log

Blog

While auditing the Kubernetes source code, I recently discovered an issue (CVE-2020-8566) in Kubernetes that may cause sensitive data leakage....

Friends don’t let friends Curl | Bash

Blog

You know those software installation instructions that tell you to download and run a script directly from the internet, as...

Sysdig Introduces Sysdig Secure 3.0: The Industry’s First Kubernetes-Native Threat Prevention and Incident Response Tool

press releases

New features enable enterprises to deploy securely, block threats at runtime, and quickly triage alerts SAN FRANCISCO — Nov. 13,...

Sysdig Announces the Cloud-Native Security Hub is Available

press releases

Cloud-Native Security Hub creates a home for cloud-native best practices, rules, and configurations SAN DIEGO, KubeCon + CloudNativeCon — Nov....

Protection From Malicious Python Libraries Jeilyfish and Python3-dateutil

Blog

Two malicious Python libraries, jeilyfish (with a capital i and a lowercase L in the original name) and python3-dateutil, were...

Securing the Cloud with End-to-end Detection

whitepapers

In this paper, we examine the multiple layers at which cloud‑based applications and infrastructure are threatened by attacks. We look at how these threat vectors can be detected using Falco, and how Sysdig's platform, built with Falco at its core, brings extra security based on its unique capabilities.

Detecting cryptomining attacks “in the wild”

Blog

Cryptomining attacks are becoming more notable in-line with the rise of blockchain and cryptocurrencies, so detecting cryptomining has become a...

Overview

page

Discover interesting data points derived from how and when organizations are implementing security in the development lifecycle.

1 11 12 13 14 15 49

Stay up to date! Sign up to receive our newsletter.