Home / Companies / Sysdig / Hacker News

Sysdig on HN

60 posts with 1+ points since 2022

Filters
Since:
Posts by Month (60 total)
Hacker News Posts
Title Points Comments Date
eBPF Offensive Capabilities – Get Ready for Next-Gen Malware (2023) 89 -- 2024-07-24
Analysis on Docker Hub malicious images: Attacks through public container images 70 -- 2022-11-23
GitHub Actions being abused to run crypto mining 44 -- 2022-10-26
Tales from the Kernel Parameter Side 38 -- 2022-11-04
Awesome Kubectl plugins for Security Engineers 21 -- 2023-02-17
SBOM 101 – All the questions you were afraid to ask Software … 21 -- 2022-08-23
CVE-2022-0185: Detecting Linux Kernel vulnerability causing container escape 21 -- 2022-01-22
Kubernetes 1.25 will be out next week – List of new features … 18 -- 2022-08-16
The Cost of Cryptomining: Adversarial Analysis of TeamTNT 17 -- 2022-11-16
New “bring your own filesystem” (BYOF) technique for crypto mining, uses PRoot 16 -- 2022-12-05
Digital Forensics Basics: A Practical Guide for Kubernetes DFIR 16 -- 2022-03-29
Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer 15 -- 2022-03-25
OWASP Kubernetes Top – Tools and Techniques 14 -- 2023-02-21
Responding to the Dropbox Breach with a Falco GitHub Plugin 11 -- 2022-11-04
Secure SSH on EC2: What are the real threats? 10 -- 2022-06-14
Global conflicts influenced cyber attack behaviors 9 -- 2022-11-30
Millions Wasted on Kubernetes Resources 8 -- 2023-03-02
Kubernetes 1.24 will be out next week – List of what's new … 8 -- 2022-04-12
Timeline: Killnet Cyber Attacks Against Italy and NATO Countries 7 -- 2022-05-20
Shai-Hulud: The novel self-replicating worm infecting NPM packages 7 -- 2025-09-17
Fuzzing and Bypassing the AWS WAF 6 -- 2024-01-10
CVE-2023-0210 – Linux Kernel Unauthenticated Remote Heap Overflow Within Ksmbd 6 -- 2023-01-24
SSH-Snake: New Self-Modifying Worm Threatens Networks 5 -- 2024-02-23
2023 Global Cloud Threat Cloud Attacks Are Fast 4 -- 2023-08-02
Falco, de-facto Kubernetes threat detection engine, graduates from CNCF 4 -- 2024-02-29
8220 Gang continues to evolve with each new campaign 4 -- 2023-02-16
Overcoming Developer Fatigue: Strategies for Streamlining Vulnerability Fixes 4 -- 2023-02-14
Cryptominer detection: a Machine Learning approach 4 -- 2022-08-10
Compromising Read-Only Containers with Fileless Malware 4 -- 2022-05-03
Kubernetes 1.31 – What's New? 3 -- 2024-08-02
Exploring Syscall Evasion – Linux Shell Builtins – Sysdig 3 -- 2024-02-14
Proxyjacking – How attackers are monetizing internet bandwidth post exploitation 3 -- 2023-04-04
CVE-2022-42889 Explotation, Detection and Mitigation 3 -- 2022-10-19
Building honeypots with vcluster and Falco: Episode I 3 -- 2022-10-04
Sysdig 2022 Threat Cloud-native threats are increasing and maturing 3 -- 2022-09-28
AWS Security Groups Guide 3 -- 2022-09-24
How to secure Kubernetes deployment with Cosign and Connaisseur 3 -- 2022-07-12
Building on Sysdig’s Open Source Foundation 3 -- 2022-05-17
Prometheus 2.35 – What’s New? 3 -- 2022-05-06
Triaging a Malicious Docker Container 3 -- 2022-03-14
Detecting and mitigating CVE-2024-12084: rsync remote code execution 3 -- 2025-01-20
Rubycarp: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group 2 -- 2024-04-10
Terraform Security Best Practices 2 -- 2023-03-26
Kubernetes CPU Requests and Limits vs Autoscaling 2 -- 2023-03-16
Scarleteel: Operation leveraging Terraform, Kubernetes, and AWS for data theft 2 -- 2023-03-05
AWS Security Best Practices to Adopt in Production 2 -- 2022-09-22
Trends BlackHat Asia 2022 – Kubernetes, Cloud Securty and Supply Chain Attacks 2 -- 2022-05-14
How to secure DNS in the cloud? – Understanding Cloud DNS security … 1 -- 2022-08-08
LLMjacking: Stolen Cloud Credentials Used in New AI Attack 1 -- 2024-08-28
What's New in K8s 1.30 1 -- 2024-04-16
Kernel Introspection from Linux to Windows 1 -- 2024-02-07
Labrat: Stealthy Cryptojacking and Proxyjacking Campaign Targeting Gitlab 1 -- 2023-08-17
Run Faster, Runtime Followers 1 -- 2023-05-06
Chaos Malware – Evolving Persistence and Evasion Techniques 1 -- 2023-03-17
Extortion in Cloud Storage 1 -- 2022-11-29
Understanding Kubernetes Evicted Pods 1 -- 2022-09-25
Attackers use exposed Prometheus server to exploit Kubernetes clusters 1 -- 2022-07-26
Understanding CVSS severity and using them effectively 1 -- 2022-04-21
LLMjacking Targets DeepSeek 1 -- 2025-02-09
ZynorRAT technical analysis: Reverse engineering a go-based remote access trojan 1 -- 2025-09-10