128 Hacker News submissions by month with at least  points since the start of

128 submissions with 1 points or greater

HN Points HN Title (Links to original post) Submitted Date
221 Container security best practices: Ultimate guide 2021-10-13
137 The art of writing eBPF programs 2019-02-27
102 Implementing Open Source Container Security, Part 1: Runtime Security 2018-07-13
89 eBPF Offensive Capabilities – Get Ready for Next-Gen Malware (2023) 2024-07-24
70 Analysis on Docker Hub malicious images: Attacks through public container images 2022-11-23
69 Fishing for Hackers: Analysis of a Linux Server Attack (2014) 2018-11-06
67 Privilege escalation through Kubernetes dashboard 2019-01-11
44 GitHub Actions being abused to run crypto mining 2022-10-26
38 Tales from the Kernel Parameter Side 2022-11-04
21 Awesome Kubectl plugins for Security Engineers 2023-02-17
21 SBOM 101 – All the questions you were afraid to ask Software Bill of Materials 2022-08-23
21 CVE-2022-0185: Detecting Linux Kernel vulnerability causing container escape 2022-01-22
20 Kubernetes 1.22 – What's New 2021-07-29
18 Kubernetes 1.25 will be out next week – List of new features and deprecations 2022-08-16
18 Mitigate CVE-2021-33909 Sequoia – Linux FS privilege escalation 2021-07-28
17 The Cost of Cryptomining: Adversarial Analysis of TeamTNT 2022-11-16
16 New “bring your own filesystem” (BYOF) technique for crypto mining, uses PRoot 2022-12-05
16 Digital Forensics Basics: A Practical Guide for Kubernetes DFIR 2022-03-29
15 Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer 2022-03-25
14 OWASP Kubernetes Top – Tools and Techniques 2023-02-21
12 Trigger a Kubernetes HPA with Prometheus Metrics 2021-10-10
11 Responding to the Dropbox Breach with a Falco GitHub Plugin 2022-11-04
11 AuditD vs. Falco as Host Intrusion Detection Tools 2021-01-19
10 Detecting crypto script kiddies 2018-03-23
10 Secure SSH on EC2: What are the real threats? 2022-06-14
10 What's new in Kubernetes 1.23? Releases next week 2021-11-30
9 Global conflicts influenced cyber attack behaviors 2022-11-30
9 How to Implement Open Source Container Security: Part 2 Docker Image Scanning 2018-07-16
8 Millions Wasted on Kubernetes Resources 2023-03-02
8 Kubernetes 1.24 will be out next week – List of what's new and what's deprecated 2022-04-12
8 Secure software supply chain: why every link matters 2021-11-09
7 Timeline: Killnet Cyber Attacks Against Italy and NATO Countries 2022-05-20
7 Crypto miner attack involving RinBot’s server, a popular Discord bot 2021-01-27
7 Kubernetes 1.13 released today, this is whats new 2018-12-03
7 Kubernetes 1.12 will be released on Tuesday, this is what's new 2018-09-20
6 Fuzzing and Bypassing the AWS WAF 2024-01-10
6 CVE-2023-0210 – Linux Kernel Unauthenticated Remote Heap Overflow Within Ksmbd 2023-01-24
6 Detecting exploits of CVE-2019-5736: runc container breakout with Falco 2019-02-12
6 Sysdig – Kubernetes Monitoring with Prometheus, the ultimate guide (part 1) 2018-08-17
5 SSH-Snake: New Self-Modifying Worm Threatens Networks 2024-02-23
5 Kubernetes 1.14 is out, this is what's new 2019-03-26
5 29 Docker security tools compared 2018-11-08
4 2023 Global Cloud Threat Cloud Attacks Are Fast 2023-08-02
4 Falco, de-facto Kubernetes threat detection engine, graduates from CNCF 2024-02-29
4 8220 Gang continues to evolve with each new campaign 2023-02-16
4 Overcoming Developer Fatigue: Strategies for Streamlining Vulnerability Fixes 2023-02-14
4 Cryptominer detection: a Machine Learning approach 2022-08-10
4 Compromising Read-Only Containers with Fileless Malware 2022-05-03
4 How to Establish a Culture of Secure DevOps 2021-07-18
4 Using Docker for Minecraft development environments 2018-07-26
4 A troubleshooting story: Running images with mismatched” Linux kernel versions 2018-02-20
3 How to build a Kubernetes Horizontal Pod Autoscaler using custom metrics 2018-02-20
3 Kubernetes 1.31 – What's New? 2024-08-02
3 Exploring Syscall Evasion – Linux Shell Builtins – Sysdig 2024-02-14
3 Proxyjacking – How attackers are monetizing internet bandwidth post exploitation 2023-04-04
3 CVE-2022-42889 Explotation, Detection and Mitigation 2022-10-19
3 Building honeypots with vcluster and Falco: Episode I 2022-10-04
3 Sysdig 2022 Threat Cloud-native threats are increasing and maturing 2022-09-28
3 AWS Security Groups Guide 2022-09-24
3 How to secure Kubernetes deployment with Cosign and Connaisseur 2022-07-12
3 Building on Sysdig’s Open Source Foundation 2022-05-17
3 Prometheus 2.35 – What’s New? 2022-05-06
3 Triaging a Malicious Docker Container 2022-03-14
3 Top PostgreSQL monitoring metrics for Prometheus – Includes cheat sheet 2021-11-23
3 What’s New in Kubernetes 1.21? 2021-04-01
3 How to detect sudo’s CVE-2021-3156 using Falco 2021-01-29
3 Sysdig 2021 Container Security and Usage Report 2021-01-18
3 Attack of the mutant tags (Or why tag mutability is a real security threat) 2020-06-25
3 Sysdig Introduces the First Cloud-Scale Prometheus Monitoring Offering 2020-03-28
3 What's New with Kubernetes 1.18 2020-03-20
3 Sysdig 2019 Container Usage New Kubernetes and Security Insights 2019-12-17
3 Kubernetes 1.16 is being released tomorrow: this is what’s new 2019-09-17
3 GKE Security Using Falco, Pub/Sub and Cloud Functions 2019-05-14
3 Troubleshooting in Kubernetes: kubectl capture plugin 2019-04-04
3 Falco Support for K8s Audit Events 2018-11-15
3 Detecting JQuery File Upload Plugin Vulnerability Using Falco (CVE-2018-9206) 2018-10-23
3 Announcing Sysdig’s $68.5M series D funding 2018-09-12
3 Creating dashboards of Kubernetes security events with Falco and a EFK stack 2018-04-05
3 Fishing for Hackers 2 – Kubernetes Boogaloo 2018-01-04
2 Rubycarp: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group 2024-04-10
2 Terraform Security Best Practices 2023-03-26
2 Kubernetes CPU Requests and Limits vs Autoscaling 2023-03-16
2 Scarleteel: Operation leveraging Terraform, Kubernetes, and AWS for data theft 2023-03-05
2 AWS Security Best Practices to Adopt in Production 2022-09-22
2 Trends BlackHat Asia 2022 – Kubernetes, Cloud Securty and Supply Chain Attacks 2022-05-14
2 Exploiting and Mitigating CVE-2021-44228: Log4j Remote Code Execution (RCE) 2021-12-15
2 Threat news: TeamTNT stealing credentials using EC2 Instance Metadata 2021-12-07
2 Step-by-step Muhstik botnet. Crypto-mining attacks targeting Kubernetes 2021-11-16
2 Detecting new crypto mining attack targeting Kubeflow and TensorFlow 2021-06-30
2 CVE-2021-25735: Kubernetes validating admission webhook bypass 2021-05-02
2 What’s New in Kubernetes 1.20? 2020-12-01
2 Detecting suspicious file activity inside a container 2020-08-12
2 How to detect CVE-2019-14287 using Falco 2019-10-16
2 Mitre ATT&CK Framework for Container Runtime Security with Sysdig Falco 2019-05-12
2 Kubernetes Pod Security Policy with Kube-Psp-advisor 2019-02-09
2 Dynamic DNS and Falco: detecting unexpected network activity 2018-11-18
2 Kubernetes Monitoring with Prometheus, the ultimate guide (part 1) 2018-08-16
2 2018 docker usage report [pdf] 2018-06-27
2 Active Kubernetes Opensource Security with Sysdig Falco, NATS, and Kubeless 2018-05-07
2 Debugging Kubernetes Crashloopbackoffs 2018-05-06
2 Three Ways Red Hat Acquiring CoreOS Helps Cloud Native 2018-02-01
1 How to secure DNS in the cloud? – Understanding Cloud DNS security methods 2022-08-08
1 LLMjacking: Stolen Cloud Credentials Used in New AI Attack 2024-08-28
1 What's New in K8s 1.30 2024-04-16
1 Kernel Introspection from Linux to Windows 2024-02-07
1 Labrat: Stealthy Cryptojacking and Proxyjacking Campaign Targeting Gitlab 2023-08-17
1 Run Faster, Runtime Followers 2023-05-06
1 Chaos Malware – Evolving Persistence and Evasion Techniques 2023-03-17
1 Extortion in Cloud Storage 2022-11-29
1 Understanding Kubernetes Evicted Pods 2022-09-25
1 Attackers use exposed Prometheus server to exploit Kubernetes clusters 2022-07-26
1 Understanding CVSS severity and using them effectively 2022-04-21
1 Sysdig doubles valuation in 8 months to $2.5b 2021-12-15
1 Cloud lateral movement: Breaking in through a vulnerable container 2021-05-13
1 Monitoring Kubernetes in Production 2020-07-09
1 Challenges Using Prometheus at Scale 2020-03-27
1 Sysdig Closes $70M in Series E Funding 2020-01-23
1 What's New in Kubernetes 1.17 2019-12-09
1 Prometheus metrics / OpenMetrics code instrumentation 2019-03-19
1 How to identify malicious IP activity using Falco 2018-12-04
1 Visualizing AWS Storage with Real-Time Latency Spectrogram 2018-11-07
1 Falco joins the CNCF Sandbox providing cloudnative container security 2018-10-16
1 GKE Security with Falco and Google Cloud Security Command Center 2018-06-19
1 2018 Docker Usage Report 2018-06-05
1 Detecting Cryptojacking with Sysdig's Opensource Project Falco 2018-03-16
1 Making sense of Meltdown/Spectre with Sysdig 2018-01-10
3 Detecting and mitigating CVE-2024-12084: rsync remote code execution 2025-01-20
1 LLMjacking Targets DeepSeek 2025-02-09