Sysdig is a Representative Vendor in the 2024 Gartner® Market Guide for CNAPP
GET THE GUIDE
NEW: Sysdig introduces the first conversational AI cloud security analyst
LEARN MORE
Discover the top trends and insights in cloud-native usage and security
DOWNLOAD NOW
Products
Back
Products
Security
Sysdig Secure
CNAPP Powered by Runtime Insights
Observability
Sysdig Monitor
Kubernetes and Prometheus Monitoring
Platform – 3rd Column Header – Hidden
Runtime Insights
AI Workload Security
Sysdig Sage GenAI
Integrations
Pricing
Solutions
Back
Solutions
Security
Cloud Detection & Response
Vulnerability Management
Posture Management
Permissions & Entitlement
Server Threat Detection
Observability
Kubernetes Monitoring
Prometheus Monitoring
Custom Metrics
Cloud Monitoring
Cost Optimization
View All
Environments
Kubernetes & Containers
Serverless
Amazon Web Services
Google Cloud
Microsoft Azure
IBM Cloud
View All
Open Source
Back
Open Source
Open Source – 1st Column Header – HIdden
Sysdig and Open Source
Projects
Falco
Open Policy Agent
Prometheus
Why Sysdig
Back
Why Sysdig
Why Sysdig
About Us
Our Customers
Threat Research Team
5/5/5 Benchmark
2024 Cloud-Native Security & Usage Report
Runtime Insights Ecosystem
Compare Sysdig
Aqua
Crowdstrike
Lacework
Orca
Prisma Cloud
SentinelOne
Wiz
Resources
Back
Resources
Resources – 1st Column Header – Hidden
Blog
Cloud security thought leadership, industry insights, and Sysdig news
Threat Research
Latest threat research and news
Education
Content Library
Events & Webinars
Training Portal
Learn Cloud Native
Newsroom
Topics
Container Security
Cloud Security
Monitoring
Compliance
Support
Support
Sysdig Status
Documentation
Search
Back
Search for:
Search
Best Match
View all search results
Languages
Back
Language
Language Header – Hidden
Deutsch
English
Español
Français
Italiano
日本
Log In
Back
Log In
Monitor
US-East
US-West
EU-Central
AWS-AP-Sydney
AWS-AP-South
GCP-US-West
Secure
US-East
US-West
EU-Central
AWS-AP-Sydney
AWS-AP-South
GCP-US-West
Log In – 3rd Column Header – HIdden
Support
Get Demo
Blog
Miguel Hernández
Miguel Hernández
Threat Research, Cloud Security
CRYSTALRAY: Inside the Operations of a Rising Threat Actor Exploiting OSS Tools
Threat Research
Meet the Research behind our Threat Research Team
Blogs by Miguel Hernández
Filter By:
Threat Research, Cloud Security
CRYSTALRAY: Inside the Operations of a Rising Threat Actor Exploiting OSS Tools
Miguel Hernández | July 11th, 2024
Threat Research
Meet the Research behind our Threat Research Team
Miguel Hernández | April 26th, 2024
Threat Research
SSH-Snake: New Self-Modifying Worm Threatens Networks
Miguel Hernández | February 20th, 2024
Threat Research, Cloud Security, Kubernetes & Container Security
CVE-2023-38545: High Severity cURL Vulnerability Detection
Miguel Hernández | October 12th, 2023
Threat Research, Cloud Security, Kubernetes & Container Security, Open Source
LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab
Miguel Hernández | August 17th, 2023
Threat Research, Cloud Security, Kubernetes & Container Security
KeePass CVE-2023-32784: Detection of Processes Memory Dump
Miguel Hernández | June 13th, 2023
Cloud Security, Compliance
Why Companies Still Struggle with Least Privilege in the Cloud
Miguel Hernández | March 14th, 2023
Open Source, Kubernetes & Container Security
ChatGPT as your Falco Consultant
Miguel Hernández | February 24th, 2023
Kubernetes & Container Security
Vulnerability Prioritization – Combating Developer Fatigue
Miguel Hernández | February 14th, 2023
Cloud Security, Compliance, Kubernetes & Container Security, Open Source, Threat Research
Blackhat 2022 recap – Trends and highlights
Miguel Hernández | August 12th, 2022
Kubernetes & Container Security, Monitoring, Open Source
How attackers use exposed Prometheus server to exploit Kubernetes clusters
Miguel Hernández | July 5th, 2022
Cloud Security
Securing SSH on EC2: What are the real threats?
Miguel Hernández | June 14th, 2022
Back to Blog