newsroom

Read our most recent press releases, product launches, and company stories

Tech CEOs Share Top 9 AI Trends To Watch In 2025
News
6/13/2025

Tech CEOs Share Top 9 AI Trends To Watch In 2025

view source
Tech CEOs Share Top 9 AI Trends To Watch In 2025
press release

Sysdig Unveils the Industry’s First Agentic Cloud Security Platform

Read More
Sysdig Unveils the Industry’s First Agentic Cloud Security Platform
blog

The Vision Comes to Life: Agentic Cloud Security with Sysdig Sage™

Read More
The Vision Comes to Life: Agentic Cloud Security with Sysdig Sage™
browse complete library
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
SCARLETEEL Fine-Tunes AWS and Kubernetes Attack Tactics
News
7/13/2023

SCARLETEEL Fine-Tunes AWS and Kubernetes Attack Tactics

view source
SCARLETEEL Cryptojacking Campaign Exploiting AWS Fargate in Ongoing Campaign
News
7/11/2023

SCARLETEEL Cryptojacking Campaign Exploiting AWS Fargate in Ongoing Campaign

view source
'ScarletEel' Hackers Worm into AWS Cloud
News
7/11/2023

'ScarletEel' Hackers Worm into AWS Cloud

view source
Cryptominer Scarleteel Evolves Tactics to Steal Container Credentials
News
7/11/2023

Cryptominer Scarleteel Evolves Tactics to Steal Container Credentials

view source
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sysdig Threat Report Reveals Victims Lose $53 for every $1 Cryptojackers Gain
press release
9/28/2022

Sysdig Threat Report Reveals Victims Lose $53 for every $1 Cryptojackers Gain

Falco Threat Detection Extends to gVisor to Monitor Highly Sensitive Workloads
press release
9/15/2022

Falco Threat Detection Extends to gVisor to Monitor Highly Sensitive Workloads

Sysdig CSPM Remediates Security Issues in Seconds
press release
9/14/2022

Sysdig CSPM Remediates Security Issues in Seconds

Sysdig Blocks Cryptojacking in the Cloud with 99% Precision Using Machine Learning
press release
8/10/2022

Sysdig Blocks Cryptojacking in the Cloud with 99% Precision Using Machine Learning

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Detecting suspicious activity on AWS using cloud logs
BLOGS
7/11/2022

Detecting suspicious activity on AWS using cloud logs

How attackers use exposed Prometheus server to exploit Kubernetes clusters
BLOGS
7/5/2022

How attackers use exposed Prometheus server to exploit Kubernetes clusters

Adapting security to Amazon EKS Anywhere on Bare Metal
BLOGS
6/30/2022

Adapting security to Amazon EKS Anywhere on Bare Metal

How to monitor nginx in Kubernetes with Prometheus
BLOGS
6/30/2022

How to monitor nginx in Kubernetes with Prometheus

Like what you see?