Sysdig Site Search
Software supply chain attacks: why every link matters
To improve our supply chain security, it is necessary to understand the attacks that take place in the supply chain....
Exploiting IAM security misconfigurations
These three IAM security misconfigurations scenarios are rather common. Discover how they can be exploited, but also, how easy it...
How to mitigate CVE-2021-33909 Sequoia with Falco – Linux filesystem privilege escalation vulnerability
The CVE-2021-33909, named Sequoia, is a new privilege escalation vulnerability that affects Linux’s file system. It was disclosed in July,...
Mitigating CVE-2021-20291: DoS affecting CRI-O and Podman
The CVE-2021-20291 medium-level vulnerability has been found in containers/storage Go library, leading to Denial of Service (DoS) when vulnerable container...
Preventing malicious use of Weave Scope
Intezer and Microsoft reported on Sept. 9 that TeamTNT hackers are deploying Weave Scope in compromised systems as an auxiliary...
New GKE installation for Docker monitoring
Stuff just takes…too…long these days. How long should you wait, for example , to monitor your docker containers on GKE?...
Kubernetes 1.33 – What’s new?
Introducing Kubernetes 1.33: Cloud-native improvements for dev and security teams The Kubernetes 1.33 release continues the project’s momentum in delivering...
MySpace? Your security
In the early 2000s, one of the hardest choices many of us faced online was selecting our MySpace “Top 8”...
ɆCDR: How Cloud Has Changed the Game
Some organizations are just beginning their migration to the cloud, while others are already firmly settled there, but almost everyone...
Shift Left is Only Part of Secure Software Delivery in Financial Services
Assessing the security of modern cloud applications requires security practices in development as well as production. Learn how financial services organizations can secure their cloud apps across the entire lifecycle.