Hacker News new | past | comments | ask | show | jobs | submit | from login
LLMjacking: Stolen Cloud Credentials Used in New AI Attack (sysdig.com)
1 point by karagenit 3 months ago | past
Kubernetes 1.31 – What's New? (sysdig.com)
3 points by teleforce 3 months ago | past
Kubernetes 1.31 – What's New? (sysdig.com)
2 points by KitKatbiberon 4 months ago | past
eBPF Offensive Capabilities – Get Ready for Next-Gen Malware (2023) (sysdig.com)
89 points by password4321 4 months ago | past | 13 comments
What's New in K8s 1.30 (sysdig.com)
1 point by aritraghosh007 7 months ago | past
Rubycarp: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group (sysdig.com)
2 points by massimosgrelli 7 months ago | past
Falco, de-facto Kubernetes threat detection engine, graduates from CNCF (sysdig.com)
4 points by KitKatbiberon 9 months ago | past
SSH-Snake: New Self-Modifying Worm Threatens Networks (sysdig.com)
5 points by knoxa2511 9 months ago | past
Exploring Syscall Evasion – Linux Shell Builtins – Sysdig (sysdig.com)
3 points by lsferreira42 9 months ago | past
Kernel Introspection from Linux to Windows (sysdig.com)
1 point by jojodoi 9 months ago | past
Fuzzing and Bypassing the AWS WAF (sysdig.com)
6 points by knoxa2511 10 months ago | past
Labrat: Stealthy Cryptojacking and Proxyjacking Campaign Targeting Gitlab (sysdig.com)
1 point by knoxa2511 on Aug 17, 2023 | past
2023 Global Cloud Threat Cloud Attacks Are Fast (sysdig.com)
4 points by KitKatbiberon on Aug 2, 2023 | past | 1 comment
Run Faster, Runtime Followers (sysdig.com)
1 point by simonebrunozzi on May 6, 2023 | past
Proxyjacking – How attackers are monetizing internet bandwidth post exploitation (sysdig.com)
3 points by weseven on April 4, 2023 | past
Terraform Security Best Practices (sysdig.com)
2 points by simonebrunozzi on March 26, 2023 | past
Chaos Malware – Evolving Persistence and Evasion Techniques (sysdig.com)
1 point by anomalytics on March 17, 2023 | past
Kubernetes CPU Requests and Limits vs Autoscaling (sysdig.com)
2 points by alwaysanon on March 16, 2023 | past
Scarleteel: Operation leveraging Terraform, Kubernetes, and AWS for data theft (sysdig.com)
2 points by DrRobinson on March 5, 2023 | past
Operation leveraging Terraform, Kubernetes, and AWS for data theft (sysdig.com)
1 point by programd on March 2, 2023 | past
Millions Wasted on Kubernetes Resources (sysdig.com)
8 points by elvacin on March 2, 2023 | past | 1 comment
OWASP Kubernetes Top – Tools and Techniques (sysdig.com)
14 points by MiguelHzBz on Feb 21, 2023 | past
Awesome Kubectl plugins for Security Engineers (sysdig.com)
21 points by anomalytics on Feb 17, 2023 | past | 1 comment
8220 Gang continues to evolve with each new campaign (sysdig.com)
4 points by e-Minguez on Feb 16, 2023 | past
Overcoming Developer Fatigue: Strategies for Streamlining Vulnerability Fixes (sysdig.com)
4 points by MiguelHzBz on Feb 14, 2023 | past
CVE-2023-0210 – Linux Kernel Unauthenticated Remote Heap Overflow Within Ksmbd (sysdig.com)
6 points by MiguelHzBz on Jan 24, 2023 | past
New “bring your own filesystem” (BYOF) technique for crypto mining, uses PRoot (sysdig.com)
16 points by e-Minguez on Dec 5, 2022 | past
Cryptomining operation leveraging GitHub Actions (sysdig.com)
1 point by mau on Dec 4, 2022 | past
Global conflicts influenced cyber attack behaviors (sysdig.com)
9 points by e-Minguez on Nov 30, 2022 | past
Extortion in Cloud Storage (sysdig.com)
1 point by MiguelHzBz on Nov 29, 2022 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: