Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
CVE-2025-49844: "RediShell" Critical Remote Code Execution in Redis (sysdig.com)
2 points by KitKatbiberon 16 days ago | past | 1 comment
Shai-Hulud: The novel self-replicating worm infecting NPM packages (sysdig.com)
7 points by Bogdanp 35 days ago | past
ZynorRAT technical analysis: Reverse engineering a go-based remote access trojan (sysdig.com)
1 point by rubin55 43 days ago | past
LLMjacking Targets DeepSeek (sysdig.com)
1 point by cf100clunk 8 months ago | past
Detecting and mitigating CVE-2024-12084: rsync remote code execution (sysdig.com)
4 points by JoachimS 9 months ago | past | 1 comment
LLMjacking: Stolen Cloud Credentials Used in New AI Attack (sysdig.com)
1 point by karagenit on Aug 28, 2024 | past
Kubernetes 1.31 – What's New? (sysdig.com)
3 points by teleforce on Aug 2, 2024 | past
Kubernetes 1.31 – What's New? (sysdig.com)
2 points by KitKatbiberon on July 26, 2024 | past
eBPF Offensive Capabilities – Get Ready for Next-Gen Malware (2023) (sysdig.com)
89 points by password4321 on July 24, 2024 | past | 13 comments
What's New in K8s 1.30 (sysdig.com)
1 point by aritraghosh007 on April 16, 2024 | past
Rubycarp: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group (sysdig.com)
2 points by massimosgrelli on April 10, 2024 | past
Falco, de-facto Kubernetes threat detection engine, graduates from CNCF (sysdig.com)
4 points by KitKatbiberon on Feb 29, 2024 | past
SSH-Snake: New Self-Modifying Worm Threatens Networks (sysdig.com)
5 points by knoxa2511 on Feb 23, 2024 | past
Exploring Syscall Evasion – Linux Shell Builtins – Sysdig (sysdig.com)
3 points by lsferreira42 on Feb 14, 2024 | past
Kernel Introspection from Linux to Windows (sysdig.com)
1 point by jojodoi on Feb 7, 2024 | past
Fuzzing and Bypassing the AWS WAF (sysdig.com)
6 points by knoxa2511 on Jan 10, 2024 | past
Labrat: Stealthy Cryptojacking and Proxyjacking Campaign Targeting Gitlab (sysdig.com)
1 point by knoxa2511 on Aug 17, 2023 | past
2023 Global Cloud Threat Cloud Attacks Are Fast (sysdig.com)
4 points by KitKatbiberon on Aug 2, 2023 | past | 1 comment
Run Faster, Runtime Followers (sysdig.com)
1 point by simonebrunozzi on May 6, 2023 | past
Proxyjacking – How attackers are monetizing internet bandwidth post exploitation (sysdig.com)
3 points by weseven on April 4, 2023 | past
Terraform Security Best Practices (sysdig.com)
2 points by simonebrunozzi on March 26, 2023 | past
Chaos Malware – Evolving Persistence and Evasion Techniques (sysdig.com)
1 point by anomalytics on March 17, 2023 | past
Kubernetes CPU Requests and Limits vs Autoscaling (sysdig.com)
2 points by alwaysanon on March 16, 2023 | past
Scarleteel: Operation leveraging Terraform, Kubernetes, and AWS for data theft (sysdig.com)
2 points by DrRobinson on March 5, 2023 | past
Operation leveraging Terraform, Kubernetes, and AWS for data theft (sysdig.com)
1 point by programd on March 2, 2023 | past
Millions Wasted on Kubernetes Resources (sysdig.com)
8 points by elvacin on March 2, 2023 | past | 1 comment
OWASP Kubernetes Top – Tools and Techniques (sysdig.com)
14 points by MiguelHzBz on Feb 21, 2023 | past
Awesome Kubectl plugins for Security Engineers (sysdig.com)
21 points by anomalytics on Feb 17, 2023 | past | 1 comment
8220 Gang continues to evolve with each new campaign (sysdig.com)
4 points by e-Minguez on Feb 16, 2023 | past
Overcoming Developer Fatigue: Strategies for Streamlining Vulnerability Fixes (sysdig.com)
4 points by MiguelHzBz on Feb 14, 2023 | past

Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: