Back from KubeCon Europe, and we're still thinking about Lumin Nights. ✨ An evening of great food, music, and even better conversations with some of the sharpest minds in cloud-native security. This was exactly the kind of night that reminds us why this community is so special. We're still riding the high from this one. Thank you TrueFullstaq for the partnership! #KubeConEU
Sysdig
Computer and Network Security
San Francisco, California 61,102 followers
The leader in real-time cloud security
About us
Good-enough security isn’t good enough. Sysdig helps security and development teams prevent, detect, and respond to cloud threats instantly. Founded by Falco and Wireshark creators and built on agentic AI, Sysdig delivers real-time defense grounded in the uncompromising truth of runtime. With streaming views of what’s running, Sysdig correlates signals across workloads, identities, and services to expose hidden attack paths and active risk, enabling teams to tailor defenses together. No guesswork. No black boxes. Just cloud security, the right way.
- Website
-
https://www.sysdig.com/
External link for Sysdig
- Industry
- Computer and Network Security
- Company size
- 501-1,000 employees
- Headquarters
- San Francisco, California
- Type
- Privately Held
- Founded
- 2013
- Specialties
- DevOps, Kubernetes, Containers, Security, Cybersecurity, Compliance, Vulnerability Management, Image Scanning, Threat Prevention, cloud security, container security, CSPM, CWPP, CDR, Cloud detection and response, CNAPP, and cloud native application protection
Products
Sysdig
Cloud Workload Protection Platforms
Sysdig is the industry-leading cloud-native application protection platform (CNAPP), delivering the breadth of coverage and depth of insights required to protect cloud environments. Sysdig consolidates cloud security into a single platform that enables security and DevOps teams to focus on the most critical risks across their cloud infrastructure, spanning containers, cloud services, servers, identities, and third-party apps. Sysdig seamlessly combines agentless with agent-based deployments to provide comprehensive visibility, preventing attacks and detecting and responding to threats with cloud speed. Cloud Attack Graph, the neural center of Sysdig’s CNAPP, correlates assets, activity, and risks across domains and uncovers hidden attack paths. By leveraging runtime insights and the power of open source Falco, Sysdig delivers the context needed to instantly prioritize and mitigate active risks in the cloud.
Locations
Employees at Sysdig
Updates
-
Podcast 🤝 runtime security 🤝 our CISO Sergej Epp Yeahhhh … we’re totally into this! Big thanks to Cloud Security Podcast for having him on!
Sergej Epp ran a hackathon inside his security team at Sysdig. Not to build product. To find out what his own team could do with AI if nobody said no. The use cases that came out surprised him. His argument: security teams keep waiting for a vendor to solve the AI problem for them. The teams that will win are the ones experimenting internally right now, building their own feedback loops, their own automation, their own version of YOLO mode for defence. The question isn't what AI can do for security in theory. It's what your team would build if you gave them a day to try. Follow Cloud Security Podcast for weekly conversations with the practitioners on the frontline of this. #cloudsecurity #CISO #cybersecurity
-
-
Attacks are moving faster than most teams can respond. As disclosure-to-exploitation windows collapse, supply chains weaken, and AI introduces new blind spots, risk is accelerating fast. On April 9, join Sysdig Threat Research expert Crystal Morin and CISO in Residence Conor Sherman for a live breakdown of what’s actually impacting risk right now: → How fast attackers are operationalizing new vulnerabilities → What recent supply chain attacks reveal about “trusted” tools → Where AI is quietly expanding your attack surface Security dominated the headlines in March. Come get the context behind the news and what to do next. Bring your questions. Leave with answers you can act on.
The Future of Threats: The April Security Briefing
www.linkedin.com
-
🚨 No PoC. No CVE. STILL exploited in under 10 hours. 🚨 A critical flaw in the marimo OSS Python notebook platform was disclosed on April 8. Less than 10 hours later, an attacker was already stealing credentials. 👀 What the Sysdig Threat Research Team observed: ➝ Unauthenticated RCE via a single WebSocket endpoint (/terminal/ws) ➝ Direct interactive shell access, no payload crafting needed ➝ Exploit built purely from advisory details ➝ First exploitation attempt observed within 9h 41m of advisory publication ⏱️ How the attack happened: ➝ Initial connection to validate access (scripted PoC markers) ➝ Rapid shift to hands-on keyboard exploration ➝ Immediate targeting of sensitive files (.env) ➝ Credential exfiltration within 3 minutes ➝ Follow-up session to revalidate and recheck access 💥 Why this matters: ➝ Attackers are watching advisories beyond just the high-profile targets ➝ Advisory transparency = attacker acceleration ➝ No CVE ≠ No risk ➝ Interactive access drastically speeds up post-exploitation 🛡️ What to do: ➝ Upgrade marimo to ≥ 0.23.0 immediately ➝ Rotate any credentials stored in .env or environment variables ➝ Do not expose notebook platforms directly to the internet without an authentication layer ➝ Restrict or disable terminal WebSocket access ➝ Monitor for unexpected connections to /terminal/ws 🎯 The takeaway: We’re watching exploitation timelines collapse in real time. This mirrors recent cases (like Langflow) but more than 2x faster. Attackers aren’t waiting for PoCs anymore. They’re reading advisories and building exploits on the fly. Full breakdown >>> https://okt.to/WdRzxp #ThreatResearch
-
-
It’s not just about new threats — it’s about how fast they turn into real risk. ☁️ In some cases, the gap between disclosure and exploitation is measured in hours, not days. 🎙️ Tomorrow at 10:00 AM CDT, @Crystal Morin and @Conor Sherman break down what’s actually changing your risk right now — from rapidly exploited vulnerabilities to supply chain attacks and emerging AI-driven exposure. This isn’t a recap of headlines. It’s a look at what they mean for security teams in practice. Save your seat: https://okt.to/iyx0Vg #ThreatResearch #LinkedInLive
-
-
📣 The Sysdig MCP server is now available in AWS Marketplace, making it easier to connect Sysdig runtime insights with AI-powered workflows through Amazon Bedrock. 📣 With the Sysdig MCP server, teams can: 🔹 Give AI agents real-time runtime security context 🔹 Accelerate investigations with natural language queries 🔹 Automate remediation workflows with human oversight 🔹 Bring security insights directly into CI/CD pipelines By connecting AI agents with real-time security data, teams can move beyond dashboards and start building context-aware security automation. Read the article: https://lnkd.in/gS3tbERw #AISecurity
-
-
Seeing risk isn’t the same as stopping it. 👀⚡ For years, cloud security has focused on visibility: misconfigurations, vulnerabilities, and exposed assets. That foundation still matters. But attackers don’t wait for the next scan. They move in minutes. This is where visibility breaks down. Without runtime context, teams can’t answer the questions that matter most: 🔹 What actually happened? 🔹 What’s at risk right now? 🔹 What action should we take next? Cloud security is shifting from visibility to action — because risk becomes real at runtime. Read the article: https://okt.to/Gmlw82 #RuntimeSecurity
-
-
March highlighted a hard truth: Exploitation is accelerating. Attack surfaces are expanding. And trusted tools are becoming entry points. Join us for our upcoming LinkedIn Live as Crystal Morin and Conor Sherman break down the biggest security stories from the month — from breached agents and AI-powered attacks to high-impact vulnerabilities and real-world exploitation. We’ll cover: 🔹 The AI issues that dominated March 🔹 The vulnerabilities and attack activity security teams can’t ignore 🔹 What these trends mean for defenders right now 📅 April 9, 2026 🕙 10:00 a.m. CDT Save your spot: https://okt.to/IEVvXN #CloudSecurity #AI #ThreatResearch #LinkedInLive
-
-
What a week at KubeCon Europe! We felt a shift in how teams are thinking about cloud security. ☁️ This year’s conversations pointed to 3 big changes: 🔹 Kubernetes is becoming a distributed OS for AI 🔹 Teams are actively prioritizing runtime security 🔹 Preventive controls alone aren’t enough to stop modern threats From AI-driven risk to workload visibility, security teams are looking for ways to see what’s happening in real time and respond faster. Check out our highlights from KubeCon! 🎥⚡ #KubeCon
-
EtherRAT marked a shift from opportunistic exploitation to long-term, stealthy access. This implant goes far beyond cryptomining and credential theft — designed to stay hidden, maintain access, and blend into normal activity. The result: a resilient, hard-to-detect implant built for sustained access 📈 — not quick wins. In this session, Crystal Morin and Michael Clark from the Sysdig Threat Research Team discuss how EtherRAT works, what makes its tradecraft unique, and what defenders need to watch for — from blockchain-based C2 resolution to fileless-style execution and aggressive persistence. 🎥 Watch the on-demand webinar to see how it operates and how to detect it in your environment: https://okt.to/B89i1f #CloudSecurity #ThreatResearch