Home
/
Companies
/
Sysdig
/
Hacker News
Sysdig on HN
60 posts with 1+ points since 2022
Filters
Min points:
1
10
25
50
100
250
500
Since:
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
Posts by Month (60 total)
Hacker News Posts
Search:
Title
Points
Comments
Date
eBPF Offensive Capabilities – Get Ready for Next-Gen Malware (2023)
89
--
2024-07-24
Analysis on Docker Hub malicious images: Attacks through public container images
70
--
2022-11-23
GitHub Actions being abused to run crypto mining
44
--
2022-10-26
Tales from the Kernel Parameter Side
38
--
2022-11-04
Awesome Kubectl plugins for Security Engineers
21
--
2023-02-17
SBOM 101 – All the questions you were afraid to ask Software …
21
--
2022-08-23
CVE-2022-0185: Detecting Linux Kernel vulnerability causing container escape
21
--
2022-01-22
Kubernetes 1.25 will be out next week – List of new features …
18
--
2022-08-16
The Cost of Cryptomining: Adversarial Analysis of TeamTNT
17
--
2022-11-16
New “bring your own filesystem” (BYOF) technique for crypto mining, uses PRoot
16
--
2022-12-05
Digital Forensics Basics: A Practical Guide for Kubernetes DFIR
16
--
2022-03-29
Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer
15
--
2022-03-25
OWASP Kubernetes Top – Tools and Techniques
14
--
2023-02-21
Responding to the Dropbox Breach with a Falco GitHub Plugin
11
--
2022-11-04
Secure SSH on EC2: What are the real threats?
10
--
2022-06-14
Global conflicts influenced cyber attack behaviors
9
--
2022-11-30
Millions Wasted on Kubernetes Resources
8
--
2023-03-02
Kubernetes 1.24 will be out next week – List of what's new …
8
--
2022-04-12
Timeline: Killnet Cyber Attacks Against Italy and NATO Countries
7
--
2022-05-20
Shai-Hulud: The novel self-replicating worm infecting NPM packages
7
--
2025-09-17
Fuzzing and Bypassing the AWS WAF
6
--
2024-01-10
CVE-2023-0210 – Linux Kernel Unauthenticated Remote Heap Overflow Within Ksmbd
6
--
2023-01-24
SSH-Snake: New Self-Modifying Worm Threatens Networks
5
--
2024-02-23
2023 Global Cloud Threat Cloud Attacks Are Fast
4
--
2023-08-02
Falco, de-facto Kubernetes threat detection engine, graduates from CNCF
4
--
2024-02-29
8220 Gang continues to evolve with each new campaign
4
--
2023-02-16
Overcoming Developer Fatigue: Strategies for Streamlining Vulnerability Fixes
4
--
2023-02-14
Cryptominer detection: a Machine Learning approach
4
--
2022-08-10
Compromising Read-Only Containers with Fileless Malware
4
--
2022-05-03
Kubernetes 1.31 – What's New?
3
--
2024-08-02
Exploring Syscall Evasion – Linux Shell Builtins – Sysdig
3
--
2024-02-14
Proxyjacking – How attackers are monetizing internet bandwidth post exploitation
3
--
2023-04-04
CVE-2022-42889 Explotation, Detection and Mitigation
3
--
2022-10-19
Building honeypots with vcluster and Falco: Episode I
3
--
2022-10-04
Sysdig 2022 Threat Cloud-native threats are increasing and maturing
3
--
2022-09-28
AWS Security Groups Guide
3
--
2022-09-24
How to secure Kubernetes deployment with Cosign and Connaisseur
3
--
2022-07-12
Building on Sysdig’s Open Source Foundation
3
--
2022-05-17
Prometheus 2.35 – What’s New?
3
--
2022-05-06
Triaging a Malicious Docker Container
3
--
2022-03-14
Detecting and mitigating CVE-2024-12084: rsync remote code execution
3
--
2025-01-20
Rubycarp: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group
2
--
2024-04-10
Terraform Security Best Practices
2
--
2023-03-26
Kubernetes CPU Requests and Limits vs Autoscaling
2
--
2023-03-16
Scarleteel: Operation leveraging Terraform, Kubernetes, and AWS for data theft
2
--
2023-03-05
AWS Security Best Practices to Adopt in Production
2
--
2022-09-22
Trends BlackHat Asia 2022 – Kubernetes, Cloud Securty and Supply Chain Attacks
2
--
2022-05-14
How to secure DNS in the cloud? – Understanding Cloud DNS security …
1
--
2022-08-08
LLMjacking: Stolen Cloud Credentials Used in New AI Attack
1
--
2024-08-28
What's New in K8s 1.30
1
--
2024-04-16
Kernel Introspection from Linux to Windows
1
--
2024-02-07
Labrat: Stealthy Cryptojacking and Proxyjacking Campaign Targeting Gitlab
1
--
2023-08-17
Run Faster, Runtime Followers
1
--
2023-05-06
Chaos Malware – Evolving Persistence and Evasion Techniques
1
--
2023-03-17
Extortion in Cloud Storage
1
--
2022-11-29
Understanding Kubernetes Evicted Pods
1
--
2022-09-25
Attackers use exposed Prometheus server to exploit Kubernetes clusters
1
--
2022-07-26
Understanding CVSS severity and using them effectively
1
--
2022-04-21
LLMjacking Targets DeepSeek
1
--
2025-02-09
ZynorRAT technical analysis: Reverse engineering a go-based remote access trojan
1
--
2025-09-10