Home / Companies / Sysdig / Hacker News

Sysdig on HN

80 posts with 1+ points since 2021

Filters
Since:
Posts by Month (80 total)
Hacker News Posts
Title Points Comments Date
Container security best practices: Ultimate guide 221 -- 2021-10-13
eBPF Offensive Capabilities – Get Ready for Next-Gen Malware (2023) 89 -- 2024-07-24
Analysis on Docker Hub malicious images: Attacks through public container images 70 -- 2022-11-23
GitHub Actions being abused to run crypto mining 44 -- 2022-10-26
Tales from the Kernel Parameter Side 38 -- 2022-11-04
Awesome Kubectl plugins for Security Engineers 21 -- 2023-02-17
SBOM 101 – All the questions you were afraid to ask Software … 21 -- 2022-08-23
CVE-2022-0185: Detecting Linux Kernel vulnerability causing container escape 21 -- 2022-01-22
Kubernetes 1.22 – What's New 20 -- 2021-07-29
Kubernetes 1.25 will be out next week – List of new features … 18 -- 2022-08-16
Mitigate CVE-2021-33909 Sequoia – Linux FS privilege escalation 18 -- 2021-07-28
The Cost of Cryptomining: Adversarial Analysis of TeamTNT 17 -- 2022-11-16
New “bring your own filesystem” (BYOF) technique for crypto mining, uses PRoot 16 -- 2022-12-05
Digital Forensics Basics: A Practical Guide for Kubernetes DFIR 16 -- 2022-03-29
Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer 15 -- 2022-03-25
OWASP Kubernetes Top – Tools and Techniques 14 -- 2023-02-21
Trigger a Kubernetes HPA with Prometheus Metrics 12 -- 2021-10-10
Responding to the Dropbox Breach with a Falco GitHub Plugin 11 -- 2022-11-04
AuditD vs. Falco as Host Intrusion Detection Tools 11 -- 2021-01-19
Secure SSH on EC2: What are the real threats? 10 -- 2022-06-14
What's new in Kubernetes 1.23? Releases next week 10 -- 2021-11-30
Global conflicts influenced cyber attack behaviors 9 -- 2022-11-30
Millions Wasted on Kubernetes Resources 8 -- 2023-03-02
Kubernetes 1.24 will be out next week – List of what's new … 8 -- 2022-04-12
Secure software supply chain: why every link matters 8 -- 2021-11-09
Timeline: Killnet Cyber Attacks Against Italy and NATO Countries 7 -- 2022-05-20
Crypto miner attack involving RinBot’s server, a popular Discord bot 7 -- 2021-01-27
Shai-Hulud: The novel self-replicating worm infecting NPM packages 7 -- 2025-09-17
Fuzzing and Bypassing the AWS WAF 6 -- 2024-01-10
CVE-2023-0210 – Linux Kernel Unauthenticated Remote Heap Overflow Within Ksmbd 6 -- 2023-01-24
SSH-Snake: New Self-Modifying Worm Threatens Networks 5 -- 2024-02-23
2023 Global Cloud Threat Cloud Attacks Are Fast 4 -- 2023-08-02
Falco, de-facto Kubernetes threat detection engine, graduates from CNCF 4 -- 2024-02-29
8220 Gang continues to evolve with each new campaign 4 -- 2023-02-16
Overcoming Developer Fatigue: Strategies for Streamlining Vulnerability Fixes 4 -- 2023-02-14
Cryptominer detection: a Machine Learning approach 4 -- 2022-08-10
Compromising Read-Only Containers with Fileless Malware 4 -- 2022-05-03
How to Establish a Culture of Secure DevOps 4 -- 2021-07-18
Kubernetes 1.31 – What's New? 3 -- 2024-08-02
Exploring Syscall Evasion – Linux Shell Builtins – Sysdig 3 -- 2024-02-14
Proxyjacking – How attackers are monetizing internet bandwidth post exploitation 3 -- 2023-04-04
CVE-2022-42889 Explotation, Detection and Mitigation 3 -- 2022-10-19
Building honeypots with vcluster and Falco: Episode I 3 -- 2022-10-04
Sysdig 2022 Threat Cloud-native threats are increasing and maturing 3 -- 2022-09-28
AWS Security Groups Guide 3 -- 2022-09-24
How to secure Kubernetes deployment with Cosign and Connaisseur 3 -- 2022-07-12
Building on Sysdig’s Open Source Foundation 3 -- 2022-05-17
Prometheus 2.35 – What’s New? 3 -- 2022-05-06
Triaging a Malicious Docker Container 3 -- 2022-03-14
Top PostgreSQL monitoring metrics for Prometheus – Includes cheat sheet 3 -- 2021-11-23
What’s New in Kubernetes 1.21? 3 -- 2021-04-01
How to detect sudo’s CVE-2021-3156 using Falco 3 -- 2021-01-29
Sysdig 2021 Container Security and Usage Report 3 -- 2021-01-18
Detecting and mitigating CVE-2024-12084: rsync remote code execution 3 -- 2025-01-20
Rubycarp: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group 2 -- 2024-04-10
Terraform Security Best Practices 2 -- 2023-03-26
Kubernetes CPU Requests and Limits vs Autoscaling 2 -- 2023-03-16
Scarleteel: Operation leveraging Terraform, Kubernetes, and AWS for data theft 2 -- 2023-03-05
AWS Security Best Practices to Adopt in Production 2 -- 2022-09-22
Trends BlackHat Asia 2022 – Kubernetes, Cloud Securty and Supply Chain Attacks 2 -- 2022-05-14
Exploiting and Mitigating CVE-2021-44228: Log4j Remote Code Execution (RCE) 2 -- 2021-12-15
Threat news: TeamTNT stealing credentials using EC2 Instance Metadata 2 -- 2021-12-07
Step-by-step Muhstik botnet. Crypto-mining attacks targeting Kubernetes 2 -- 2021-11-16
Detecting new crypto mining attack targeting Kubeflow and TensorFlow 2 -- 2021-06-30
CVE-2021-25735: Kubernetes validating admission webhook bypass 2 -- 2021-05-02
How to secure DNS in the cloud? – Understanding Cloud DNS security … 1 -- 2022-08-08
LLMjacking: Stolen Cloud Credentials Used in New AI Attack 1 -- 2024-08-28
What's New in K8s 1.30 1 -- 2024-04-16
Kernel Introspection from Linux to Windows 1 -- 2024-02-07
Labrat: Stealthy Cryptojacking and Proxyjacking Campaign Targeting Gitlab 1 -- 2023-08-17
Run Faster, Runtime Followers 1 -- 2023-05-06
Chaos Malware – Evolving Persistence and Evasion Techniques 1 -- 2023-03-17
Extortion in Cloud Storage 1 -- 2022-11-29
Understanding Kubernetes Evicted Pods 1 -- 2022-09-25
Attackers use exposed Prometheus server to exploit Kubernetes clusters 1 -- 2022-07-26
Understanding CVSS severity and using them effectively 1 -- 2022-04-21
Sysdig doubles valuation in 8 months to $2.5b 1 -- 2021-12-15
Cloud lateral movement: Breaking in through a vulnerable container 1 -- 2021-05-13
LLMjacking Targets DeepSeek 1 -- 2025-02-09
ZynorRAT technical analysis: Reverse engineering a go-based remote access trojan 1 -- 2025-09-10