78 Hacker News submissions by month with at least  points since the start of

78 submissions with 1 points or greater

HN Points HN Title (Links to original post) Submitted Date
221 Container security best practices: Ultimate guide 2021-10-13
89 eBPF Offensive Capabilities – Get Ready for Next-Gen Malware (2023) 2024-07-24
70 Analysis on Docker Hub malicious images: Attacks through public container images 2022-11-23
44 GitHub Actions being abused to run crypto mining 2022-10-26
38 Tales from the Kernel Parameter Side 2022-11-04
21 Awesome Kubectl plugins for Security Engineers 2023-02-17
21 SBOM 101 – All the questions you were afraid to ask Software Bill of Materials 2022-08-23
21 CVE-2022-0185: Detecting Linux Kernel vulnerability causing container escape 2022-01-22
20 Kubernetes 1.22 – What's New 2021-07-29
18 Kubernetes 1.25 will be out next week – List of new features and deprecations 2022-08-16
18 Mitigate CVE-2021-33909 Sequoia – Linux FS privilege escalation 2021-07-28
17 The Cost of Cryptomining: Adversarial Analysis of TeamTNT 2022-11-16
16 New “bring your own filesystem” (BYOF) technique for crypto mining, uses PRoot 2022-12-05
16 Digital Forensics Basics: A Practical Guide for Kubernetes DFIR 2022-03-29
15 Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer 2022-03-25
14 OWASP Kubernetes Top – Tools and Techniques 2023-02-21
12 Trigger a Kubernetes HPA with Prometheus Metrics 2021-10-10
11 Responding to the Dropbox Breach with a Falco GitHub Plugin 2022-11-04
11 AuditD vs. Falco as Host Intrusion Detection Tools 2021-01-19
10 Secure SSH on EC2: What are the real threats? 2022-06-14
10 What's new in Kubernetes 1.23? Releases next week 2021-11-30
9 Global conflicts influenced cyber attack behaviors 2022-11-30
8 Millions Wasted on Kubernetes Resources 2023-03-02
8 Kubernetes 1.24 will be out next week – List of what's new and what's deprecated 2022-04-12
8 Secure software supply chain: why every link matters 2021-11-09
7 Timeline: Killnet Cyber Attacks Against Italy and NATO Countries 2022-05-20
7 Crypto miner attack involving RinBot’s server, a popular Discord bot 2021-01-27
6 Fuzzing and Bypassing the AWS WAF 2024-01-10
6 CVE-2023-0210 – Linux Kernel Unauthenticated Remote Heap Overflow Within Ksmbd 2023-01-24
5 SSH-Snake: New Self-Modifying Worm Threatens Networks 2024-02-23
4 2023 Global Cloud Threat Cloud Attacks Are Fast 2023-08-02
4 Falco, de-facto Kubernetes threat detection engine, graduates from CNCF 2024-02-29
4 8220 Gang continues to evolve with each new campaign 2023-02-16
4 Overcoming Developer Fatigue: Strategies for Streamlining Vulnerability Fixes 2023-02-14
4 Cryptominer detection: a Machine Learning approach 2022-08-10
4 Compromising Read-Only Containers with Fileless Malware 2022-05-03
4 How to Establish a Culture of Secure DevOps 2021-07-18
3 Kubernetes 1.31 – What's New? 2024-08-02
3 Exploring Syscall Evasion – Linux Shell Builtins – Sysdig 2024-02-14
3 Proxyjacking – How attackers are monetizing internet bandwidth post exploitation 2023-04-04
3 CVE-2022-42889 Explotation, Detection and Mitigation 2022-10-19
3 Building honeypots with vcluster and Falco: Episode I 2022-10-04
3 Sysdig 2022 Threat Cloud-native threats are increasing and maturing 2022-09-28
3 AWS Security Groups Guide 2022-09-24
3 How to secure Kubernetes deployment with Cosign and Connaisseur 2022-07-12
3 Building on Sysdig’s Open Source Foundation 2022-05-17
3 Prometheus 2.35 – What’s New? 2022-05-06
3 Triaging a Malicious Docker Container 2022-03-14
3 Top PostgreSQL monitoring metrics for Prometheus – Includes cheat sheet 2021-11-23
3 What’s New in Kubernetes 1.21? 2021-04-01
3 How to detect sudo’s CVE-2021-3156 using Falco 2021-01-29
3 Sysdig 2021 Container Security and Usage Report 2021-01-18
2 Rubycarp: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group 2024-04-10
2 Terraform Security Best Practices 2023-03-26
2 Kubernetes CPU Requests and Limits vs Autoscaling 2023-03-16
2 Scarleteel: Operation leveraging Terraform, Kubernetes, and AWS for data theft 2023-03-05
2 AWS Security Best Practices to Adopt in Production 2022-09-22
2 Trends BlackHat Asia 2022 – Kubernetes, Cloud Securty and Supply Chain Attacks 2022-05-14
2 Exploiting and Mitigating CVE-2021-44228: Log4j Remote Code Execution (RCE) 2021-12-15
2 Threat news: TeamTNT stealing credentials using EC2 Instance Metadata 2021-12-07
2 Step-by-step Muhstik botnet. Crypto-mining attacks targeting Kubernetes 2021-11-16
2 Detecting new crypto mining attack targeting Kubeflow and TensorFlow 2021-06-30
2 CVE-2021-25735: Kubernetes validating admission webhook bypass 2021-05-02
1 How to secure DNS in the cloud? – Understanding Cloud DNS security methods 2022-08-08
1 LLMjacking: Stolen Cloud Credentials Used in New AI Attack 2024-08-28
1 What's New in K8s 1.30 2024-04-16
1 Kernel Introspection from Linux to Windows 2024-02-07
1 Labrat: Stealthy Cryptojacking and Proxyjacking Campaign Targeting Gitlab 2023-08-17
1 Run Faster, Runtime Followers 2023-05-06
1 Chaos Malware – Evolving Persistence and Evasion Techniques 2023-03-17
1 Extortion in Cloud Storage 2022-11-29
1 Understanding Kubernetes Evicted Pods 2022-09-25
1 Attackers use exposed Prometheus server to exploit Kubernetes clusters 2022-07-26
1 Understanding CVSS severity and using them effectively 2022-04-21
1 Sysdig doubles valuation in 8 months to $2.5b 2021-12-15
1 Cloud lateral movement: Breaking in through a vulnerable container 2021-05-13
3 Detecting and mitigating CVE-2024-12084: rsync remote code execution 2025-01-20
1 LLMjacking Targets DeepSeek 2025-02-09