213 Hacker News submissions for Sysdig

HN Points HN Title (Links to submission) Submitted Date
270 Container Isolation Gone Wrong 2017-06-28
221 Container security best practices: Ultimate guide 2021-10-13
208 50 Shades of System Calls 2016-02-23
151 How we found a bug in Amazon ELB 2016-04-28
137 The art of writing eBPF programs 2019-02-27
125 Sysdig Inspect: A GUI for System Call Analysis 2017-12-05
102 Implementing Open Source Container Security, Part 1: Runtime Security 2018-07-13
89 eBPF Offensive Capabilities – Get Ready for Next-Gen Malware (2023) 2024-07-24
85 SELinux, Seccomp, Falco, and You: A Technical Discussion 2016-12-09
72 50 Shades of System Calls 2016-07-20
70 Analysis on Docker Hub malicious images: Attacks through public container images 2022-11-23
69 Fishing for Hackers: Analysis of a Linux Server Attack (2014) 2018-11-06
69 Sysdig vs. DTrace vs. Strace (2014) 2016-02-27
67 Privilege escalation through Kubernetes dashboard 2019-01-11
44 GitHub Actions being abused to run crypto mining 2022-10-26
38 Tales from the Kernel Parameter Side 2022-11-04
21 Awesome Kubectl plugins for Security Engineers 2023-02-17
21 SBOM 101 – All the questions you were afraid to ask Software Bill of Materials 2022-08-23
21 CVE-2022-0185: Detecting Linux Kernel vulnerability causing container escape 2022-01-22
20 Kubernetes 1.22 – What's New 2021-07-29
20 7 Docker security vulnerabilities and threats 2017-08-25
19 Show HN: Csysdig – think strace and htop and Lua and container support 2015-06-04
18 Kubernetes 1.25 will be out next week – List of new features and deprecations 2022-08-16
18 Mitigate CVE-2021-33909 Sequoia – Linux FS privilege escalation 2021-07-28
18 Linux Troubleshooting Cheatsheet: strace, htop, lsof, tcpdump, iftop and sysdig 2016-04-14
17 The Cost of Cryptomining: Adversarial Analysis of TeamTNT 2022-11-16
16 New “bring your own filesystem” (BYOF) technique for crypto mining, uses PRoot 2022-12-05
16 Digital Forensics Basics: A Practical Guide for Kubernetes DFIR 2022-03-29
15 Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer 2022-03-25
14 OWASP Kubernetes Top – Tools and Techniques 2023-02-21
12 Trigger a Kubernetes HPA with Prometheus Metrics 2021-10-10
11 ECS, Fargate and EKS (Kubernetes on AWS) Compared and Explained in a Nutshell 2017-11-30
11 Responding to the Dropbox Breach with a Falco GitHub Plugin 2022-11-04
11 AuditD vs. Falco as Host Intrusion Detection Tools 2021-01-19
10 Detecting crypto script kiddies 2018-03-23
10 Secure SSH on EC2: What are the real threats? 2022-06-14
10 What's new in Kubernetes 1.23? Releases next week 2021-11-30
9 Sysdig Raises $13M and Launches Container-Native Monitoring 2015-07-14
9 Global conflicts influenced cyber attack behaviors 2022-11-30
9 How to Implement Open Source Container Security: Part 2 Docker Image Scanning 2018-07-16
8 Millions Wasted on Kubernetes Resources 2023-03-02
8 Kubernetes 1.24 will be out next week – List of what's new and what's deprecated 2022-04-12
8 Secure software supply chain: why every link matters 2021-11-09
8 Introducing Falco: open source, behavioral security from Sysdig 2016-05-18
7 Timeline: Killnet Cyber Attacks Against Italy and NATO Countries 2022-05-20
7 Crypto miner attack involving RinBot’s server, a popular Discord bot 2021-01-27
7 Kubernetes 1.13 released today, this is whats new 2018-12-03
7 Kubernetes 1.12 will be released on Tuesday, this is what's new 2018-09-20
7 How to write a custom Kubernetes scheduler 2017-11-03
6 Fuzzing and Bypassing the AWS WAF 2024-01-10
6 CVE-2023-0210 – Linux Kernel Unauthenticated Remote Heap Overflow Within Ksmbd 2023-01-24
6 Detecting exploits of CVE-2019-5736: runc container breakout with Falco 2019-02-12
6 Sysdig – Kubernetes Monitoring with Prometheus, the ultimate guide (part 1) 2018-08-17
6 A Ceph Guide for Kubernetes and Openshift Users 2017-01-30
5 SSH-Snake: New Self-Modifying Worm Threatens Networks 2024-02-23
5 Kubernetes 1.14 is out, this is what's new 2019-03-26
5 29 Docker security tools compared 2018-11-08
5 Container isolation gone wrong: a troubleshooting story 2017-05-22
5 Monitoring Docker and Kubernetes at WayBlazer 2016-09-27
5 Deploying a Private PaaS: The Good, the Meh, and the Aw Crap 2016-07-19
5 Introducing Sysdig Tracers: open source transaction tracing meets htop and strace 2016-07-14
5 Microservice-Level Monitoring for Amazon’s ECS 2015-10-06
4 2023 Global Cloud Threat Cloud Attacks Are Fast 2023-08-02
4 The Container Ecosystem Project 2015-10-21
4 Falco, de-facto Kubernetes threat detection engine, graduates from CNCF 2024-02-29
4 8220 Gang continues to evolve with each new campaign 2023-02-16
4 Overcoming Developer Fatigue: Strategies for Streamlining Vulnerability Fixes 2023-02-14
4 Cryptominer detection: a Machine Learning approach 2022-08-10
4 Compromising Read-Only Containers with Fileless Malware 2022-05-03
4 How to Establish a Culture of Secure DevOps 2021-07-18
4 Using Docker for Minecraft development environments 2018-07-26
4 A troubleshooting story: Running images with mismatched” Linux kernel versions 2018-02-20
4 Csysdig explained visually 2017-07-26
4 How to Monitor Nginx on Kubernetes 2017-05-24
3 How to build a Kubernetes Horizontal Pod Autoscaler using custom metrics 2018-02-20
3 Friends don’t let friends Curl – Bash 2016-06-28
3 Kubernetes 1.31 – What's New? 2024-08-02
3 Exploring Syscall Evasion – Linux Shell Builtins – Sysdig 2024-02-14
3 Proxyjacking – How attackers are monetizing internet bandwidth post exploitation 2023-04-04
3 CVE-2022-42889 Explotation, Detection and Mitigation 2022-10-19
3 Building honeypots with vcluster and Falco: Episode I 2022-10-04
3 Sysdig 2022 Threat Cloud-native threats are increasing and maturing 2022-09-28
3 AWS Security Groups Guide 2022-09-24
3 How to secure Kubernetes deployment with Cosign and Connaisseur 2022-07-12
3 Building on Sysdig’s Open Source Foundation 2022-05-17
3 Prometheus 2.35 – What’s New? 2022-05-06
3 Triaging a Malicious Docker Container 2022-03-14
3 Top PostgreSQL monitoring metrics for Prometheus – Includes cheat sheet 2021-11-23
3 What’s New in Kubernetes 1.21? 2021-04-01
3 How to detect sudo’s CVE-2021-3156 using Falco 2021-01-29
3 Sysdig 2021 Container Security and Usage Report 2021-01-18
3 Attack of the mutant tags (Or why tag mutability is a real security threat) 2020-06-25
3 Sysdig Introduces the First Cloud-Scale Prometheus Monitoring Offering 2020-03-28
3 What's New with Kubernetes 1.18 2020-03-20
3 Sysdig 2019 Container Usage New Kubernetes and Security Insights 2019-12-17
3 Kubernetes 1.16 is being released tomorrow: this is what’s new 2019-09-17
3 GKE Security Using Falco, Pub/Sub and Cloud Functions 2019-05-14
3 Troubleshooting in Kubernetes: kubectl capture plugin 2019-04-04
3 Falco Support for K8s Audit Events 2018-11-15
3 Detecting JQuery File Upload Plugin Vulnerability Using Falco (CVE-2018-9206) 2018-10-23
3 Announcing Sysdig’s $68.5M series D funding 2018-09-12
3 Creating dashboards of Kubernetes security events with Falco and a EFK stack 2018-04-05
3 Fishing for Hackers 2 – Kubernetes Boogaloo 2018-01-04
3 Kubernetes Security: How to harden internal kube-system services 2017-11-27
3 How to monitor Linkerd the microservices proxy 2017-05-10
3 The 2017 Docker Usage Report 2017-04-13
3 The 2017 Docker Usage Report – How enterprises actually use Docker in production 2017-04-12
3 How to Detect SSH Attempts by Chuck Norris 2017-03-16
3 Server Monitoring for Tor exit nodes 2016-12-22
3 Intro to sysdig in 15 minutes 2016-10-26
3 Sysdig surpasses 1M downloads 2016-10-26
3 When APM fails: A 502 troubleshooting tale 2016-08-23
3 Operating systems are a huge pile of technical debt 2016-08-18
3 Sending Little Bobby Tables to Detention 2016-08-15
3 Making Curl – Bash safe(r) 2016-06-14
3 Monitoring Greedy Containers 2016-06-06
3 Monitoring Mesos, Marathon, and DCOS 2016-04-11
3 How to collect statsd metrics in containers 2016-03-18
3 How to Troubleshoot with an Interactive Spectrogram 2016-01-25
3 Monitoring Kubernetes with Sysdig Cloud 2015-11-09
3 Reduce mean time to pretty charts (MTTPC) with Sysdig Cloud 2015-09-08
2 Troubleshooting Kubernetes: How container metadata changes your point of view 2016-04-05
2 Monitoring as a Microservice 2015-07-15
2 Rubycarp: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group 2024-04-10
2 Terraform Security Best Practices 2023-03-26
2 Kubernetes CPU Requests and Limits vs Autoscaling 2023-03-16
2 Scarleteel: Operation leveraging Terraform, Kubernetes, and AWS for data theft 2023-03-05
2 AWS Security Best Practices to Adopt in Production 2022-09-22
2 Trends BlackHat Asia 2022 – Kubernetes, Cloud Securty and Supply Chain Attacks 2022-05-14
2 Exploiting and Mitigating CVE-2021-44228: Log4j Remote Code Execution (RCE) 2021-12-15
2 Threat news: TeamTNT stealing credentials using EC2 Instance Metadata 2021-12-07
2 Step-by-step Muhstik botnet. Crypto-mining attacks targeting Kubernetes 2021-11-16
2 Detecting new crypto mining attack targeting Kubeflow and TensorFlow 2021-06-30
2 CVE-2021-25735: Kubernetes validating admission webhook bypass 2021-05-02
2 What’s New in Kubernetes 1.20? 2020-12-01
2 Detecting suspicious file activity inside a container 2020-08-12
2 How to detect CVE-2019-14287 using Falco 2019-10-16
2 Mitre ATT&CK Framework for Container Runtime Security with Sysdig Falco 2019-05-12
2 Kubernetes Pod Security Policy with Kube-Psp-advisor 2019-02-09
2 Dynamic DNS and Falco: detecting unexpected network activity 2018-11-18
2 Kubernetes Monitoring with Prometheus, the ultimate guide (part 1) 2018-08-16
2 2018 docker usage report [pdf] 2018-06-27
2 Active Kubernetes Opensource Security with Sysdig Falco, NATS, and Kubeless 2018-05-07
2 Debugging Kubernetes Crashloopbackoffs 2018-05-06
2 Three Ways Red Hat Acquiring CoreOS Helps Cloud Native 2018-02-01
2 Sysdig Inspect explained visually 2017-12-18
2 Sysdig raises $25M Series C to expand the Container Intelligence Platform 2017-10-12
2 Sysdig Secure – Container run-time security and forensics 2017-10-12
2 How to Monitor etcd on Kubernetes 2017-05-03
2 How to Monitor Docker Swarm 2017-04-17
2 Sysdig falco 0.6.0 released 2017-04-13
2 Four features of containers that help (and hurt) docker security 2017-03-06
2 January 2017 Container News Roundup 2017-02-03
2 On Monoliths, Kubernetes, and Monitoring: Transitioning to Docker at MLS 2016-12-15
2 System Profiling for Lazy Developers 2016-08-15
2 A Universal Slack Event Router 2016-07-06
2 Greed Is Good: Troubleshooting Kubernetes 2016-06-17
2 Dashboarding isn't Troubleshooting 2016-03-23
2 Better Container Monitoring 2016-02-22
2 A Sysdig and Kubernetes Adventure, Part 2: Troubleshooting Kubernetes Services 2015-12-03
2 A Sysdig and Kubernetes Adventure, Part 1: How Kubernetes Services Work 2015-12-02
2 Digging into Kubernetes with Sysdig 2015-11-09
2 Key Metrics Every Cassandra User Should Monitor 2015-09-29
2 Decode Your HTTP Traffic with Open Source Sysdig 2015-09-10
2 Sysdig Releases Continuous Capture with File Rotation 2015-08-06
1 How to secure DNS in the cloud? – Understanding Cloud DNS security methods 2022-08-08
1 Analyze StatsD Custom Metrics Automagically with Sysdig Cloud 2015-06-04
1 A better way to collect StatsD metrics from containers 2015-06-03
1 Application and Infrastructure Monitoring 2015-05-12
1 How Flannel actually fakes a network connection in CoreOS 2015-05-08
1 LLMjacking: Stolen Cloud Credentials Used in New AI Attack 2024-08-28
1 What's New in K8s 1.30 2024-04-16
1 Kernel Introspection from Linux to Windows 2024-02-07
1 Labrat: Stealthy Cryptojacking and Proxyjacking Campaign Targeting Gitlab 2023-08-17
1 Run Faster, Runtime Followers 2023-05-06
1 Chaos Malware – Evolving Persistence and Evasion Techniques 2023-03-17
1 Extortion in Cloud Storage 2022-11-29
1 Understanding Kubernetes Evicted Pods 2022-09-25
1 Attackers use exposed Prometheus server to exploit Kubernetes clusters 2022-07-26
1 Understanding CVSS severity and using them effectively 2022-04-21
1 Sysdig doubles valuation in 8 months to $2.5b 2021-12-15
1 Cloud lateral movement: Breaking in through a vulnerable container 2021-05-13
1 Monitoring Kubernetes in Production 2020-07-09
1 Challenges Using Prometheus at Scale 2020-03-27
1 Sysdig Closes $70M in Series E Funding 2020-01-23
1 What's New in Kubernetes 1.17 2019-12-09
1 Prometheus metrics / OpenMetrics code instrumentation 2019-03-19
1 How to identify malicious IP activity using Falco 2018-12-04
1 Visualizing AWS Storage with Real-Time Latency Spectrogram 2018-11-07
1 Falco joins the CNCF Sandbox providing cloudnative container security 2018-10-16
1 GKE Security with Falco and Google Cloud Security Command Center 2018-06-19
1 2018 Docker Usage Report 2018-06-05
1 Detecting Cryptojacking with Sysdig's Opensource Project Falco 2018-03-16
1 Making sense of Meltdown/Spectre with Sysdig 2018-01-10
1 The Big OOM Theory 2017-09-07
1 How to Monitor Nginx on Kubernetes: Metrics Alerts 2017-06-08
1 Sysdig Teams: Service-Based Access Control for Kubernetes and Docker Monitoring 2016-11-08
1 Livestream 11:45 PDT: Brendan Gregg on Designing Tracing Tools 2016-10-26
1 Livestream: A brief history of system calls – Adam Leventhal (Dtrace founder) 2016-10-26
1 Monitoring Docker on GKE and AWS at Everalbum 2016-09-28
1 Troubleshooting Cassandra column selection 2016-04-28
1 Sysdig Raises 15M to Expand Container Monitoring 2016-04-21
1 Troubleshooting containers after they're long gone 2016-03-28
1 Correlating Alerts in Container Environments 2016-03-16
1 3 ways that Kubernetes changes monitoring 2016-03-10
1 The Container Ecosystem Project 2016-03-05
1 Docker Monitoring with Docker Datacenter and Sysdig 2016-02-25
1 How ShareThis uses Kubernetes in production 2016-02-16
1 The Fascinating World of Linux System Calls 2016-02-13
1 Rkt Monitoring and Troubleshooting in Production 2016-02-04
1 Sysdig Cloud and PagerDuty: A Superior Alerting Experience 2015-11-05
1 Turning csysdig into a control panel for processes, connections and containers 2015-11-04
1 Monitoring Docker File Systems and File I/O with Sysdig Cloud 2015-11-04