Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Containers

Detecting and mitigating CVE-2023-4911: Local Privilege Escalation Vulnerability

Recently, Qualys discovered and reported a critical vulnerability affecting the popular GLIBC ecosystem, which is installed by default on most Linux-based operating systems. Specifically, a buffer overflow was found in the code responsible for handling special environment variables during the startup of a process which can result in a local privilege escalation. Fortunately, exploitation of this vulnerability can be detected by Falco.

Using Runtime Insights with Docker Scout to Prioritize Vulnerabilities

The cloud revolution has firmly taken hold, and businesses of all sizes are adopting cloud-native technologies. This new paradigm has also created newer attack surfaces for cybercriminals, who are eager to exploit known security gaps in cloud environments. Sysdig is collaborating with Docker to deliver a more efficient process for identifying risks and opportunities for accelerated remediation in Docker Scout using runtime insights.

Friday Flows Episode 8: Manage Elasticsearch and GKE clusters via Slack

This week’s Friday Flows features our first Community-built story. Big thank you to Christopher Cutajar for sharing his “Manage Elasticsearch and GKE clusters via Slack” workflow and for highlighting the great work of his team at Elastic overall. "As a team, we've built quite a lot of stuff. Both Tines and Elastic are easy to work with & provide value not just with security, but provide a platform for anyone technical or non-technical to enable the business.".

Sysdig Attack Path in action: A new way to visualize cloud security risks

Discover "Risk Prioritization" and "Attack Path Analysis" - a powerful solution designed to tackle the challenges of protecting against modern cloud attacks head-on, and provide invaluable insights into cloud security. Powered by the Cloud Attack Graph, the new Risks page shows a prioritized list of the potential risks in your cloud infrastructure. The risks in the page are not merely just another list of prescriptions: they are periodically re-evaluated and re-prioritized based on the findings in your infrastructure.

Simplifying Government Data Protection for Kubernetes with CloudCasa

In the realm of government institutions in Brazil, regional electoral courts hold a pivotal role in ensuring the integrity of the electoral process. These institutions are mandated to safeguard their essential electoral data through off-site backup solutions. While Kubernetes’ efficiency and flexibility hold great promise for modernizing operations, government data protection challenges have deterred many regional electoral courts from embracing this technology.

How to Create Deployments and Services in Kubernetes?

Kubernetes is a container orchestration tool that helps with the deployment and management of containers. Within Kubernetes, a container runs logically in a pod, which can be represented as one instance of a running service. Pods are ephemeral and not self-healing, which makes them fragile. They can go down when an interruption occurs on the server, during a brief network problem, or due to a minimal memory issue—and it can bring down your entire application with it.

Sidecar Containers in Kubernetes: A Personal Journey

I had always wanted to use sidecars with Istio or Splunk forwarder in production, but as a Kubernetes maintainer, I knew there was no reliable way of telling Kubernetes to ensure sidecar containers were kept running before and after the main application. In this post I will share the twists and turns of my adventure in addressing this long-standing Kubernetes challenge.

Enabling Workload-Level Security for Kubernetes with Checkpoint Firewall and Calico Egress Gateway

Enterprises implementing containers and Kubernetes in either corporate datacenters or cloud environments typically employ Checkpoint Quantum to secure traffic between their datacenter networks and Checkpoint CloudGuard to safeguard their cloud resources. Often these network security perimeter focused solutions are also used to scrutinize traffic originating from Kubernetes clusters.

When Seconds Count: Expanding Real-Time Capabilities Across CNAPP

The last few months at Sysdig have seen incredible product velocity as we accelerate our vision to create the leading cloud security platform, also known by the Gartner category Cloud-Native Application Protection Platform (CNAPP). In June, we enhanced our platform with end-to-end detection and response. Today, we are thrilled to unveil a suite of new capabilities powered by runtime insights: Skip ahead to the launch details!