Sysdig Site Search
CSI Forensics: Unraveling Kubernetes Crime Scenes
This is the second episode of the CSI Container series, published and presented at CloudNativeSecurityCon 2024. In this episode, we...
Harden your LLM security with OWASP
Foundationally, the OWASP Top 10 for Large Language Model (LLMs) applications was designed to educate software developers, security architects, and...
CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils
On March 29th, 2024, a backdoor in a popular package called XZ Utils was announced on the Openwall mailing list....
Prometheus Alertmanager Best Practices
Have you ever fallen asleep to the sounds of your on-call team in a Zoom call? If you’ve had the...
How to Monitor CoreDNS
CoreDNS is a DNS add-on for Kubernetes environments. It is one of the components running in the control plane nodes,...
Extortion in Cloud Storage
Extortion can simply be defined as “the practice of obtaining benefit through coercion.“ Data and cloud extortion schemes occur when...
Prometheus 2.35 – What’s new?
Prometheus 2.35 was released last month, focusing on a better integration with cloud providers. It also improved the service discovery,...
Getting started with runtime security and Falco
Discover how to get started with Falco to overcome the challenges of implementing runtime security for cloud-native workloads. If you...
How to deal with ransomware on Azure
Let’s dig deeper into the techniques used by attackers and the mitigations you should implement when ransomware on Azure affects...
What is Kubernetes CrashLoopBackOff? And how to fix it
CrashLoopBackOff is a Kubernetes state representing a restart loop that is happening in a Pod: a container in the Pod...