Quantcast
Channel: Kubernetes & Container Security | Sysdig
Browsing latest articles
Browse All 59 View Live

Detecting CVE-2025-22224 with Falco

The Shadowserver group recently identified over 41,500 internet-exposed VMware ESXi hypervisors vulnerable to CVE-2025-22224, a critical Time-of-Check Time-of-Use (TOCTOU) code execution attack. The...

View Article


Image may be NSFW.
Clik here to view.

Detecting and Mitigating IngressNightmare – CVE-2025-1974

On Monday, March 24, 2025, a set of critical vulnerabilities affecting the admission controller component of the Ingress NGINX Controller for Kubernetes was announced. In total, five vulnerabilities...

View Article


Image may be NSFW.
Clik here to view.

Next-Gen Container Security: Why Cloud Context Matters

Container security has experienced significant transformation over the past decade. From the emergence of foundational tools like Docker to the maturation of orchestration platforms such as...

View Article

Kubernetes 1.33 – What’s new?

Introducing Kubernetes 1.33: Cloud-native improvements for dev and security teams The Kubernetes 1.33 release continues the project’s momentum in delivering scalable, secure, and developer-friendly...

View Article

Cloud vs. on-prem vulnerability management: Hybrid matters

Vulnerability management requires different approaches in on-prem and cloud environments due to differences in infrastructure, scale, and operational models. As more organizations adopt hybrid...

View Article


Conoa and Sysdig: A powerful partnership for comprehensive cloud and...

Kubernetes has gone from experiment to essential — powering everything from fintech apps to telecom infrastructure and government services. But as environments scale, so do threats. By design,...

View Article

Top 15 Kubectl plugins for security engineers in 2025

Kubernetes environments keep getting more complex. Between multi-cloud setups, edge deployments, and a growing list of compliance requirements, keeping your clusters locked down is no small task....

View Article

Runtime is the real defense, not just posture

Imagine trying to defend a moving target by only studying a still image of it. That’s what most cloud security strategies look like today. Tools that scan for misconfigurations or check policy...

View Article


Image may be NSFW.
Clik here to view.

Falco is now available as an Amazon EKS add-on

We’re excited to announce that Falco, the CNCF graduated runtime security project, is now officially available as an AWS-validated Amazon EKS add-on. This marks a significant milestone in making...

View Article


The end of the prioritization-only era: Vulnerability management needs action

Security teams are drowning in vulnerability alerts. Every day seemingly brings another wave of CVEs, each demanding attention or flagged as “critical.” But not all vulnerabilities are created equal,...

View Article
Browsing latest articles
Browse All 59 View Live


Latest Images