Detecting CVE-2025-22224 with Falco
The Shadowserver group recently identified over 41,500 internet-exposed VMware ESXi hypervisors vulnerable to CVE-2025-22224, a critical Time-of-Check Time-of-Use (TOCTOU) code execution attack. The...
View ArticleDetecting and Mitigating IngressNightmare – CVE-2025-1974
On Monday, March 24, 2025, a set of critical vulnerabilities affecting the admission controller component of the Ingress NGINX Controller for Kubernetes was announced. In total, five vulnerabilities...
View ArticleNext-Gen Container Security: Why Cloud Context Matters
Container security has experienced significant transformation over the past decade. From the emergence of foundational tools like Docker to the maturation of orchestration platforms such as...
View ArticleKubernetes 1.33 – What’s new?
Introducing Kubernetes 1.33: Cloud-native improvements for dev and security teams The Kubernetes 1.33 release continues the project’s momentum in delivering scalable, secure, and developer-friendly...
View ArticleCloud vs. on-prem vulnerability management: Hybrid matters
Vulnerability management requires different approaches in on-prem and cloud environments due to differences in infrastructure, scale, and operational models. As more organizations adopt hybrid...
View ArticleConoa and Sysdig: A powerful partnership for comprehensive cloud and...
Kubernetes has gone from experiment to essential — powering everything from fintech apps to telecom infrastructure and government services. But as environments scale, so do threats. By design,...
View ArticleTop 15 Kubectl plugins for security engineers in 2025
Kubernetes environments keep getting more complex. Between multi-cloud setups, edge deployments, and a growing list of compliance requirements, keeping your clusters locked down is no small task....
View ArticleRuntime is the real defense, not just posture
Imagine trying to defend a moving target by only studying a still image of it. That’s what most cloud security strategies look like today. Tools that scan for misconfigurations or check policy...
View ArticleFalco is now available as an Amazon EKS add-on
We’re excited to announce that Falco, the CNCF graduated runtime security project, is now officially available as an AWS-validated Amazon EKS add-on. This marks a significant milestone in making...
View ArticleThe end of the prioritization-only era: Vulnerability management needs action
Security teams are drowning in vulnerability alerts. Every day seemingly brings another wave of CVEs, each demanding attention or flagged as “critical.” But not all vulnerabilities are created equal,...
View Article