Sysdig Site Search
Cloud Defense in Depth: Lessons from the Kinsing Malware
In the face of persistent data breaches and escalating cyber threats, organizations are compelled to prioritize cloud defense in depth....
Falco 0.10.0 released.
We are happy to announce the release of Falco 0.10.0. This release incorporates a number of improvements focused on making...
Dig Deeper! Prioritize Cloud Vulnerabilities and Reduce Container Spending
Bad actors will find a way into your infrastructure whether through traditional approaches like misconfigurations and vulnerabilities; or more advanced approaches such as exploiting your supply chain, impersonating a user with stolen credentials, cloud entitlements, or other techniques.
How the Critical OpenSSL Vulnerability may affect Popular Container Images
The big news this week is that a new CRITICAL OpenSSL vulnerability will be announced on November 1st, 2022. Critical-severity...
How to Detect and Respond to Threats Lurking in your GKE Workloads
The cloud-native landscape is riddled with stories of security breaches. Do you know what’s happening inside your containers on GKE?
Understanding Kubernetes Evicted Pods
What does it mean that Kubernetes Pods are evicted? They are terminated, usually the result of not having enough resources....
Announcing Falco 0.3.0
On Friday we released Falco 0.3.0. The biggest change in this release is significantly reduced cpu usage, involving changes in...
Falco’s Journey to CNCF graduation
In February 2024, Falco graduated within the Cloud Native Computing Foundation (CNCF). Graduation marks an important milestone for a journey...
Finding Suspicious Events with AWS CloudTrail: Fundamentals and Best Practices
You see the headlines, and think, “thank goodness it wasn’t us”. An overly permissive web server exposes 100 million+ consumer credit applications in an S3 bucket, leaving hundreds of millions of user records open to the public.
Detecting MITRE ATT&CK: Defense evasion techniques with Falco
The defense evasion category inside MITRE ATT&CK covers several techniques an attacker can use to avoid getting caught. Familiarizing yourself...