Home
/
Companies
/
Sysdig
/
Hacker News
Sysdig on HN
80 posts with 1+ points since 2021
Filters
Min points:
1
10
25
50
100
250
500
Since:
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
Posts by Month (80 total)
Hacker News Posts
Search:
Title
Points
Comments
Date
Container security best practices: Ultimate guide
221
--
2021-10-13
eBPF Offensive Capabilities – Get Ready for Next-Gen Malware (2023)
89
--
2024-07-24
Analysis on Docker Hub malicious images: Attacks through public container images
70
--
2022-11-23
GitHub Actions being abused to run crypto mining
44
--
2022-10-26
Tales from the Kernel Parameter Side
38
--
2022-11-04
Awesome Kubectl plugins for Security Engineers
21
--
2023-02-17
SBOM 101 – All the questions you were afraid to ask Software …
21
--
2022-08-23
CVE-2022-0185: Detecting Linux Kernel vulnerability causing container escape
21
--
2022-01-22
Kubernetes 1.22 – What's New
20
--
2021-07-29
Kubernetes 1.25 will be out next week – List of new features …
18
--
2022-08-16
Mitigate CVE-2021-33909 Sequoia – Linux FS privilege escalation
18
--
2021-07-28
The Cost of Cryptomining: Adversarial Analysis of TeamTNT
17
--
2022-11-16
New “bring your own filesystem” (BYOF) technique for crypto mining, uses PRoot
16
--
2022-12-05
Digital Forensics Basics: A Practical Guide for Kubernetes DFIR
16
--
2022-03-29
Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer
15
--
2022-03-25
OWASP Kubernetes Top – Tools and Techniques
14
--
2023-02-21
Trigger a Kubernetes HPA with Prometheus Metrics
12
--
2021-10-10
Responding to the Dropbox Breach with a Falco GitHub Plugin
11
--
2022-11-04
AuditD vs. Falco as Host Intrusion Detection Tools
11
--
2021-01-19
Secure SSH on EC2: What are the real threats?
10
--
2022-06-14
What's new in Kubernetes 1.23? Releases next week
10
--
2021-11-30
Global conflicts influenced cyber attack behaviors
9
--
2022-11-30
Millions Wasted on Kubernetes Resources
8
--
2023-03-02
Kubernetes 1.24 will be out next week – List of what's new …
8
--
2022-04-12
Secure software supply chain: why every link matters
8
--
2021-11-09
Timeline: Killnet Cyber Attacks Against Italy and NATO Countries
7
--
2022-05-20
Crypto miner attack involving RinBot’s server, a popular Discord bot
7
--
2021-01-27
Shai-Hulud: The novel self-replicating worm infecting NPM packages
7
--
2025-09-17
Fuzzing and Bypassing the AWS WAF
6
--
2024-01-10
CVE-2023-0210 – Linux Kernel Unauthenticated Remote Heap Overflow Within Ksmbd
6
--
2023-01-24
SSH-Snake: New Self-Modifying Worm Threatens Networks
5
--
2024-02-23
2023 Global Cloud Threat Cloud Attacks Are Fast
4
--
2023-08-02
Falco, de-facto Kubernetes threat detection engine, graduates from CNCF
4
--
2024-02-29
8220 Gang continues to evolve with each new campaign
4
--
2023-02-16
Overcoming Developer Fatigue: Strategies for Streamlining Vulnerability Fixes
4
--
2023-02-14
Cryptominer detection: a Machine Learning approach
4
--
2022-08-10
Compromising Read-Only Containers with Fileless Malware
4
--
2022-05-03
How to Establish a Culture of Secure DevOps
4
--
2021-07-18
Kubernetes 1.31 – What's New?
3
--
2024-08-02
Exploring Syscall Evasion – Linux Shell Builtins – Sysdig
3
--
2024-02-14
Proxyjacking – How attackers are monetizing internet bandwidth post exploitation
3
--
2023-04-04
CVE-2022-42889 Explotation, Detection and Mitigation
3
--
2022-10-19
Building honeypots with vcluster and Falco: Episode I
3
--
2022-10-04
Sysdig 2022 Threat Cloud-native threats are increasing and maturing
3
--
2022-09-28
AWS Security Groups Guide
3
--
2022-09-24
How to secure Kubernetes deployment with Cosign and Connaisseur
3
--
2022-07-12
Building on Sysdig’s Open Source Foundation
3
--
2022-05-17
Prometheus 2.35 – What’s New?
3
--
2022-05-06
Triaging a Malicious Docker Container
3
--
2022-03-14
Top PostgreSQL monitoring metrics for Prometheus – Includes cheat sheet
3
--
2021-11-23
What’s New in Kubernetes 1.21?
3
--
2021-04-01
How to detect sudo’s CVE-2021-3156 using Falco
3
--
2021-01-29
Sysdig 2021 Container Security and Usage Report
3
--
2021-01-18
Detecting and mitigating CVE-2024-12084: rsync remote code execution
3
--
2025-01-20
Rubycarp: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group
2
--
2024-04-10
Terraform Security Best Practices
2
--
2023-03-26
Kubernetes CPU Requests and Limits vs Autoscaling
2
--
2023-03-16
Scarleteel: Operation leveraging Terraform, Kubernetes, and AWS for data theft
2
--
2023-03-05
AWS Security Best Practices to Adopt in Production
2
--
2022-09-22
Trends BlackHat Asia 2022 – Kubernetes, Cloud Securty and Supply Chain Attacks
2
--
2022-05-14
Exploiting and Mitigating CVE-2021-44228: Log4j Remote Code Execution (RCE)
2
--
2021-12-15
Threat news: TeamTNT stealing credentials using EC2 Instance Metadata
2
--
2021-12-07
Step-by-step Muhstik botnet. Crypto-mining attacks targeting Kubernetes
2
--
2021-11-16
Detecting new crypto mining attack targeting Kubeflow and TensorFlow
2
--
2021-06-30
CVE-2021-25735: Kubernetes validating admission webhook bypass
2
--
2021-05-02
How to secure DNS in the cloud? – Understanding Cloud DNS security …
1
--
2022-08-08
LLMjacking: Stolen Cloud Credentials Used in New AI Attack
1
--
2024-08-28
What's New in K8s 1.30
1
--
2024-04-16
Kernel Introspection from Linux to Windows
1
--
2024-02-07
Labrat: Stealthy Cryptojacking and Proxyjacking Campaign Targeting Gitlab
1
--
2023-08-17
Run Faster, Runtime Followers
1
--
2023-05-06
Chaos Malware – Evolving Persistence and Evasion Techniques
1
--
2023-03-17
Extortion in Cloud Storage
1
--
2022-11-29
Understanding Kubernetes Evicted Pods
1
--
2022-09-25
Attackers use exposed Prometheus server to exploit Kubernetes clusters
1
--
2022-07-26
Understanding CVSS severity and using them effectively
1
--
2022-04-21
Sysdig doubles valuation in 8 months to $2.5b
1
--
2021-12-15
Cloud lateral movement: Breaking in through a vulnerable container
1
--
2021-05-13
LLMjacking Targets DeepSeek
1
--
2025-02-09
ZynorRAT technical analysis: Reverse engineering a go-based remote access trojan
1
--
2025-09-10