Sysdig Site Search
How to deal with ransomware on Azure
Let’s dig deeper into the techniques used by attackers and the mitigations you should implement when ransomware on Azure affects...
How to detect sudo’s CVE-2021-3156 using Falco
A recent privilege escalation heap overflow vulnerability (CVSS 7.8), CVE-2021-3156, has been found in sudo. sudo is a powerful utility...
Detecting CVE-2025-22224 with Falco
The Shadowserver group recently identified over 41,500 internet-exposed VMware ESXi hypervisors vulnerable to CVE-2025-22224, a critical Time-of-Check Time-of-Use (TOCTOU) code...
Exploiting IAM security misconfigurations
These three IAM security misconfigurations scenarios are rather common. Discover how they can be exploited, but also, how easy it...
How to Detect SCARLETEEL with Sysdig Secure
The recent SCARLETEEL incident highlights the importance of detecting security threats early in the development cycle. With Terraform state files,...
Why Companies Still Struggle with Least Privilege in the Cloud
Vulnerabilities are only one part of the cloud security story. Misconfigurations are still the biggest player in security incidents and,...
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
The Sysdig Threat Research Team recently discovered a sophisticated cloud operation in a customer environment, dubbed SCARLETEEL, that resulted in...
How to detect the containers’ escape capabilities with Falco
Attackers use container escape techniques when they manage to control a container so the impact they can cause is much...
Lambda Threat – Best Practices for Lambda Security
Our security research team will explain a real attack scenario from the black box and white box perspective on how...
Cloud Security Posture and Permission Management
Real attackers exploit IAM security misconfigurations to gain high privileges inside your cloud environment, discover how to detect them.