Sysdig is a Representative Vendor in the 2024 Gartner® Market Guide for CNAPP
GET THE GUIDE
NEW: Sysdig introduces the first conversational AI cloud security analyst
LEARN MORE
Discover the top trends and insights in cloud-native usage and security
DOWNLOAD NOW
Products
Back
Products
Security
Sysdig Secure
CNAPP Powered by Runtime Insights
Observability
Sysdig Monitor
Kubernetes and Prometheus Monitoring
Platform – 3rd Column Header – Hidden
Runtime Insights
AI Workload Security
Sysdig Sage GenAI
Integrations
Pricing
Solutions
Back
Solutions
Security
Cloud Detection & Response
Vulnerability Management
Posture Management
Permissions & Entitlement
Server Threat Detection
Observability
Kubernetes Monitoring
Prometheus Monitoring
Custom Metrics
Cloud Monitoring
Cost Optimization
View All
Environments
Kubernetes & Containers
Serverless
Amazon Web Services
Google Cloud
Microsoft Azure
IBM Cloud
View All
Open Source
Back
Open Source
Open Source – 1st Column Header – HIdden
Sysdig and Open Source
Projects
Falco
Open Policy Agent
Prometheus
Why Sysdig
Back
Why Sysdig
Why Sysdig
About Us
Our Customers
Threat Research Team
5/5/5 Benchmark
2024 Cloud-Native Security & Usage Report
Runtime Insights Ecosystem
Compare Sysdig
Aqua
Crowdstrike
Lacework
Orca
Prisma Cloud
SentinelOne
Wiz
Resources
Back
Resources
Resources – 1st Column Header – Hidden
Blog
Cloud security thought leadership, industry insights, and Sysdig news
Threat Research
Latest threat research and news
Education
Content Library
Events & Webinars
Training Portal
Learn Cloud Native
Newsroom
Topics
Container Security
Cloud Security
Monitoring
Compliance
Support
Support
Sysdig Status
Documentation
Search
Back
Search for:
Search
Best Match
View all search results
Languages
Back
Language
Language Header – Hidden
Deutsch
English
Español
Français
Italiano
日本
Log In
Back
Log In
Monitor
US-East
US-West
EU-Central
AWS-AP-Sydney
AWS-AP-South
GCP-US-West
Secure
US-East
US-West
EU-Central
AWS-AP-Sydney
AWS-AP-South
GCP-US-West
Log In – 3rd Column Header – HIdden
Support
Get Demo
Blog
Stefano Chierici
Stefano Chierici
Threat Research, Cloud Security
Sysdig Threat Research Team – Black Hat 2024
Threat Research
Cloud Threats Deploying Crypto CDN
Blogs by Stefano Chierici
Filter By:
Threat Research, Cloud Security
Sysdig Threat Research Team – Black Hat 2024
Stefano Chierici | July 22nd, 2024
Threat Research
Cloud Threats Deploying Crypto CDN
Stefano Chierici | March 11th, 2024
Kubernetes & Container Security, Cloud Security, Sysdig Features, Threat Research
CSI Container: Can you DFIR it?
Stefano Chierici | March 28th, 2023
Cloud Security
Exploiting IAM security misconfigurations
Stefano Chierici | December 20th, 2022
Threat Research, Cloud Security, Kubernetes & Container Security, Sysdig Features
Analysis on Docker Hub malicious images: Attacks through public container images
Stefano Chierici | November 23rd, 2022
Cloud Security
Cloud lateral movement: Breaking in through a vulnerable container
Stefano Chierici | July 25th, 2022
Kubernetes & Container Security, Threat Research
How to detect the containers’ escape capabilities with Falco
Stefano Chierici | June 21st, 2022
Threat Research
Critical Vulnerability in Spring Core: CVE-2022-22965 a.k.a. Spring4Shell
Stefano Chierici | March 31st, 2022
Threat Research
Detecting and Mitigating CVE-2022-22963: Spring Cloud RCE Vulnerability
Stefano Chierici | March 30th, 2022
Threat Research, Sysdig Features
Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer
Stefano Chierici | March 25th, 2022
Threat Research, Kubernetes & Container Security, Open Source
Mitigating CVE-2022-0811: Arbitrary code execution affecting CRI-O
Stefano Chierici | March 17th, 2022
Threat Research
CVE-2022-0492: Privilege escalation vulnerability causing container escape
Stefano Chierici | March 8th, 2022
Back to Blog