Home / Companies / Sysdig / Hacker News

Sysdig on HN

130 posts with 1+ points since 2018

Filters
Since:
Posts by Month (130 total)
Hacker News Posts
Title Points Comments Date
Container security best practices: Ultimate guide 221 -- 2021-10-13
The art of writing eBPF programs 137 -- 2019-02-27
Implementing Open Source Container Security, Part 1: Runtime Security 102 -- 2018-07-13
eBPF Offensive Capabilities – Get Ready for Next-Gen Malware (2023) 89 -- 2024-07-24
Analysis on Docker Hub malicious images: Attacks through public container images 70 -- 2022-11-23
Fishing for Hackers: Analysis of a Linux Server Attack (2014) 69 -- 2018-11-06
Privilege escalation through Kubernetes dashboard 67 -- 2019-01-11
GitHub Actions being abused to run crypto mining 44 -- 2022-10-26
Tales from the Kernel Parameter Side 38 -- 2022-11-04
Awesome Kubectl plugins for Security Engineers 21 -- 2023-02-17
SBOM 101 – All the questions you were afraid to ask Software … 21 -- 2022-08-23
CVE-2022-0185: Detecting Linux Kernel vulnerability causing container escape 21 -- 2022-01-22
Kubernetes 1.22 – What's New 20 -- 2021-07-29
Kubernetes 1.25 will be out next week – List of new features … 18 -- 2022-08-16
Mitigate CVE-2021-33909 Sequoia – Linux FS privilege escalation 18 -- 2021-07-28
The Cost of Cryptomining: Adversarial Analysis of TeamTNT 17 -- 2022-11-16
New “bring your own filesystem” (BYOF) technique for crypto mining, uses PRoot 16 -- 2022-12-05
Digital Forensics Basics: A Practical Guide for Kubernetes DFIR 16 -- 2022-03-29
Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer 15 -- 2022-03-25
OWASP Kubernetes Top – Tools and Techniques 14 -- 2023-02-21
Trigger a Kubernetes HPA with Prometheus Metrics 12 -- 2021-10-10
Responding to the Dropbox Breach with a Falco GitHub Plugin 11 -- 2022-11-04
AuditD vs. Falco as Host Intrusion Detection Tools 11 -- 2021-01-19
Detecting crypto script kiddies 10 -- 2018-03-23
Secure SSH on EC2: What are the real threats? 10 -- 2022-06-14
What's new in Kubernetes 1.23? Releases next week 10 -- 2021-11-30
Global conflicts influenced cyber attack behaviors 9 -- 2022-11-30
How to Implement Open Source Container Security: Part 2 Docker Image Scanning 9 -- 2018-07-16
Millions Wasted on Kubernetes Resources 8 -- 2023-03-02
Kubernetes 1.24 will be out next week – List of what's new … 8 -- 2022-04-12
Secure software supply chain: why every link matters 8 -- 2021-11-09
Timeline: Killnet Cyber Attacks Against Italy and NATO Countries 7 -- 2022-05-20
Crypto miner attack involving RinBot’s server, a popular Discord bot 7 -- 2021-01-27
Kubernetes 1.13 released today, this is whats new 7 -- 2018-12-03
Kubernetes 1.12 will be released on Tuesday, this is what's new 7 -- 2018-09-20
Shai-Hulud: The novel self-replicating worm infecting NPM packages 7 -- 2025-09-17
Fuzzing and Bypassing the AWS WAF 6 -- 2024-01-10
CVE-2023-0210 – Linux Kernel Unauthenticated Remote Heap Overflow Within Ksmbd 6 -- 2023-01-24
Detecting exploits of CVE-2019-5736: runc container breakout with Falco 6 -- 2019-02-12
Sysdig – Kubernetes Monitoring with Prometheus, the ultimate guide (part 1) 6 -- 2018-08-17
SSH-Snake: New Self-Modifying Worm Threatens Networks 5 -- 2024-02-23
Kubernetes 1.14 is out, this is what's new 5 -- 2019-03-26
29 Docker security tools compared 5 -- 2018-11-08
2023 Global Cloud Threat Cloud Attacks Are Fast 4 -- 2023-08-02
Falco, de-facto Kubernetes threat detection engine, graduates from CNCF 4 -- 2024-02-29
8220 Gang continues to evolve with each new campaign 4 -- 2023-02-16
Overcoming Developer Fatigue: Strategies for Streamlining Vulnerability Fixes 4 -- 2023-02-14
Cryptominer detection: a Machine Learning approach 4 -- 2022-08-10
Compromising Read-Only Containers with Fileless Malware 4 -- 2022-05-03
How to Establish a Culture of Secure DevOps 4 -- 2021-07-18
Using Docker for Minecraft development environments 4 -- 2018-07-26
A troubleshooting story: Running images with mismatched” Linux kernel versions 4 -- 2018-02-20
How to build a Kubernetes Horizontal Pod Autoscaler using custom metrics 3 -- 2018-02-20
Kubernetes 1.31 – What's New? 3 -- 2024-08-02
Exploring Syscall Evasion – Linux Shell Builtins – Sysdig 3 -- 2024-02-14
Proxyjacking – How attackers are monetizing internet bandwidth post exploitation 3 -- 2023-04-04
CVE-2022-42889 Explotation, Detection and Mitigation 3 -- 2022-10-19
Building honeypots with vcluster and Falco: Episode I 3 -- 2022-10-04
Sysdig 2022 Threat Cloud-native threats are increasing and maturing 3 -- 2022-09-28
AWS Security Groups Guide 3 -- 2022-09-24
How to secure Kubernetes deployment with Cosign and Connaisseur 3 -- 2022-07-12
Building on Sysdig’s Open Source Foundation 3 -- 2022-05-17
Prometheus 2.35 – What’s New? 3 -- 2022-05-06
Triaging a Malicious Docker Container 3 -- 2022-03-14
Top PostgreSQL monitoring metrics for Prometheus – Includes cheat sheet 3 -- 2021-11-23
What’s New in Kubernetes 1.21? 3 -- 2021-04-01
How to detect sudo’s CVE-2021-3156 using Falco 3 -- 2021-01-29
Sysdig 2021 Container Security and Usage Report 3 -- 2021-01-18
Attack of the mutant tags (Or why tag mutability is a real … 3 -- 2020-06-25
Sysdig Introduces the First Cloud-Scale Prometheus Monitoring Offering 3 -- 2020-03-28
What's New with Kubernetes 1.18 3 -- 2020-03-20
Sysdig 2019 Container Usage New Kubernetes and Security Insights 3 -- 2019-12-17
Kubernetes 1.16 is being released tomorrow: this is what’s new 3 -- 2019-09-17
GKE Security Using Falco, Pub/Sub and Cloud Functions 3 -- 2019-05-14
Troubleshooting in Kubernetes: kubectl capture plugin 3 -- 2019-04-04
Falco Support for K8s Audit Events 3 -- 2018-11-15
Detecting JQuery File Upload Plugin Vulnerability Using Falco (CVE-2018-9206) 3 -- 2018-10-23
Announcing Sysdig’s $68.5M series D funding 3 -- 2018-09-12
Creating dashboards of Kubernetes security events with Falco and a EFK stack 3 -- 2018-04-05
Fishing for Hackers 2 – Kubernetes Boogaloo 3 -- 2018-01-04
Detecting and mitigating CVE-2024-12084: rsync remote code execution 3 -- 2025-01-20
Rubycarp: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group 2 -- 2024-04-10
Terraform Security Best Practices 2 -- 2023-03-26
Kubernetes CPU Requests and Limits vs Autoscaling 2 -- 2023-03-16
Scarleteel: Operation leveraging Terraform, Kubernetes, and AWS for data theft 2 -- 2023-03-05
AWS Security Best Practices to Adopt in Production 2 -- 2022-09-22
Trends BlackHat Asia 2022 – Kubernetes, Cloud Securty and Supply Chain Attacks 2 -- 2022-05-14
Exploiting and Mitigating CVE-2021-44228: Log4j Remote Code Execution (RCE) 2 -- 2021-12-15
Threat news: TeamTNT stealing credentials using EC2 Instance Metadata 2 -- 2021-12-07
Step-by-step Muhstik botnet. Crypto-mining attacks targeting Kubernetes 2 -- 2021-11-16
Detecting new crypto mining attack targeting Kubeflow and TensorFlow 2 -- 2021-06-30
CVE-2021-25735: Kubernetes validating admission webhook bypass 2 -- 2021-05-02
What’s New in Kubernetes 1.20? 2 -- 2020-12-01
Detecting suspicious file activity inside a container 2 -- 2020-08-12
How to detect CVE-2019-14287 using Falco 2 -- 2019-10-16
Mitre ATT&CK Framework for Container Runtime Security with Sysdig Falco 2 -- 2019-05-12
Kubernetes Pod Security Policy with Kube-Psp-advisor 2 -- 2019-02-09
Dynamic DNS and Falco: detecting unexpected network activity 2 -- 2018-11-18
Kubernetes Monitoring with Prometheus, the ultimate guide (part 1) 2 -- 2018-08-16
2018 docker usage report [pdf] 2 -- 2018-06-27
Active Kubernetes Opensource Security with Sysdig Falco, NATS, and Kubeless 2 -- 2018-05-07
Debugging Kubernetes Crashloopbackoffs 2 -- 2018-05-06
Three Ways Red Hat Acquiring CoreOS Helps Cloud Native 2 -- 2018-02-01
How to secure DNS in the cloud? – Understanding Cloud DNS security … 1 -- 2022-08-08
LLMjacking: Stolen Cloud Credentials Used in New AI Attack 1 -- 2024-08-28
What's New in K8s 1.30 1 -- 2024-04-16
Kernel Introspection from Linux to Windows 1 -- 2024-02-07
Labrat: Stealthy Cryptojacking and Proxyjacking Campaign Targeting Gitlab 1 -- 2023-08-17
Run Faster, Runtime Followers 1 -- 2023-05-06
Chaos Malware – Evolving Persistence and Evasion Techniques 1 -- 2023-03-17
Extortion in Cloud Storage 1 -- 2022-11-29
Understanding Kubernetes Evicted Pods 1 -- 2022-09-25
Attackers use exposed Prometheus server to exploit Kubernetes clusters 1 -- 2022-07-26
Understanding CVSS severity and using them effectively 1 -- 2022-04-21
Sysdig doubles valuation in 8 months to $2.5b 1 -- 2021-12-15
Cloud lateral movement: Breaking in through a vulnerable container 1 -- 2021-05-13
Monitoring Kubernetes in Production 1 -- 2020-07-09
Challenges Using Prometheus at Scale 1 -- 2020-03-27
Sysdig Closes $70M in Series E Funding 1 -- 2020-01-23
What's New in Kubernetes 1.17 1 -- 2019-12-09
Prometheus metrics / OpenMetrics code instrumentation 1 -- 2019-03-19
How to identify malicious IP activity using Falco 1 -- 2018-12-04
Visualizing AWS Storage with Real-Time Latency Spectrogram 1 -- 2018-11-07
Falco joins the CNCF Sandbox providing cloudnative container security 1 -- 2018-10-16
GKE Security with Falco and Google Cloud Security Command Center 1 -- 2018-06-19
2018 Docker Usage Report 1 -- 2018-06-05
Detecting Cryptojacking with Sysdig's Opensource Project Falco 1 -- 2018-03-16
Making sense of Meltdown/Spectre with Sysdig 1 -- 2018-01-10
LLMjacking Targets DeepSeek 1 -- 2025-02-09
ZynorRAT technical analysis: Reverse engineering a go-based remote access trojan 1 -- 2025-09-10