Attackers in the cloud get too many opportunities to strike
Runtime scans detect policy failures in 91 percent of all cases. As a result, organizations are picking up potential vulnerabilities later than expected, according to a new Sysdig report.
The Sysdig report examines the state of cloud-native security. It shows that cloud environments are more sus... Read more
Docker locker, Sysdig partnership secures cloud-native apps
Docker and Sysdig have partnered to provide a new layer of real-time cloud-native security strengthening technologies that - the companies hope - will work to reduce software supply chain vulnerabilities across the multiple application and data tool topographies that exist in real world cloud envir... Read more
“Telcos are very often victims of cloud attacks”
Sysdig has just released its annual Global Cloud Threat Report. Because of the complexity of cloud environments, hackers can often be difficult to detect while having an attack in place within 10 minutes of discovering credentials.
The Sysdig team warns that a recon alert is the last chance for ... Read more
RSA Conference 2023 round-up: Cisco, Noname, Rubrik/Zscaler & more
The 2023 RSA Conference featured announcements from all over the cybersecurity sector. We're presenting a round-up of what companies have brought to the fore this year.
Cisco
We have written extensively about "Cisco's worst-kept secret": Cisco XDR. The company is adding the extended detection... Read more
New cybercrime tactic: selling someone else’s Internet connection
Cybercriminals can hijack and resell the Internet access of unsuspecting users. By making users' bandwidth available for proxyware services, criminals are able to earn up to $10 (just over €9) per affected device per month. Security vendor Sysdig warns companies of the risks.
Sysdig's Threat R... Read more
Hackers hijack Linux devices using PRoot-isolated file systems
Hackers are using BYOF (bring your own filesystem) attacks to abuse the open-source Linux PRoot utility and develop a consistent source of harmful tools compatible with Linux devices.
A BYOF attack involves a threat actor building a malicious file system on their devices that includes a typical ... Read more
Sysdig introduces Cost Advisor, savings tool for Kubernetes
Sysdig introduced Cost Advisor, a tool that allows companies to manage the costs of their cloud-based Kubernetes environments.
Many companies find it difficult to estimate the cost of cloud-based Kubernetes environments, Sysdig said. Research by the Cloud Native Computing Foundation (CNCF) repor... Read more
Sysdig automates security for cloud-based IaC environments
Sysdig has introduced a number of solutions that help companies automate security in Infrastructure as code (IaC) environments. Sysdig ToDo shows key vulnerabilities in a cloud infrastructure while Remediation Guru helps resolve these vulnerabilities.
Sysdig provides security solutions for conta... Read more
Sysdig integrates machine learning to detect cryptojacking attempts
Container security firm Sysdig introduced ML-powered cloud detection to help businesses deal with cryptojacking threats.
Sysdig announced its latest machine-learning-backed response capability and cloud detection that can aid companies in dealing with various cryptojacking threats and vulnerabil... Read more
Sysdig adds drift control for greater security
The new feature helps teams react more quickly to container modifications that are in production.
This week Sysdig announced the general availability of a new feature called Drift Control. The new service aims to prevent cyberattacks at runtime.
Drift Control allows teams to detect, prevent a... Read more