Sysdig’s cover photo
Sysdig

Sysdig

Computer and Network Security

San Francisco, California 61,213 followers

The leader in real-time cloud security

About us

Good-enough security isn’t good enough. Sysdig helps security and development teams prevent, detect, and respond to cloud threats instantly. Founded by Falco and Wireshark creators and built on agentic AI, Sysdig delivers real-time defense grounded in the uncompromising truth of runtime. With streaming views of what’s running, Sysdig correlates signals across workloads, identities, and services to expose hidden attack paths and active risk, enabling teams to tailor defenses together. No guesswork. No black boxes. Just cloud security, the right way.

Website
https://www.sysdig.com/
Industry
Computer and Network Security
Company size
501-1,000 employees
Headquarters
San Francisco, California
Type
Privately Held
Founded
2013
Specialties
DevOps, Kubernetes, Containers, Security, Cybersecurity, Compliance, Vulnerability Management, Image Scanning, Threat Prevention, cloud security, container security, CSPM, CWPP, CDR, Cloud detection and response, CNAPP, and cloud native application protection

Products

Locations

Employees at Sysdig

Updates

  • View organization page for Sysdig

    61,213 followers

    Posture gives you a strong starting point. ☁️ Runtime shows you what’s actually at risk. In fast-moving cloud environments, you need both, but only one tells you what’s happening in real time. Your Blueprint to Runtime Security, the Right Way breaks down the 3️⃣ pillars of modern cloud defense: 1. Full-stack visibility, from kernel to cloud 2. Resilience built for scale 3. Actionable detection and response Together, they turn insight into action. 🔗 https://okt.to/HwcG2y #RuntimeSecurity

  • View organization page for Sysdig

    61,213 followers

    📣 It’s heeere! The Sysdig 2026 Cloud-Native Security and Usage Report just dropped. 🔥 And one of the biggest takeaways? The human-only era of security is over. Not because people aren’t good at security, but because the cloud has gotten way too fast. For years, the security playbook has been: add more tools, add more dashboards, add more processes. 🙃 That’s not how you win anymore. The data shows: → Security is moving to machine speed. The best teams are automating detection and response instead of adding headcount. → AI is already in your cloud. AI and ML packages are becoming part of the default stack. → Runtime is where the signal is. 70%+ of orgs are already there and automation is accelerating. → Identity is exploding. Humans are a small slice and still one of the weakest links. The teams pulling ahead aren't doing more. They are building systems that can keep up. ↳ Dig into the data from the Sysdig Threat Research Team >>>: https://okt.to/XAEikm

  • View organization page for Sysdig

    61,213 followers

    🚨 CVE-2026-39987 progressed from advisory to exploitation in under 10 hours, and then from exploitation to malware deployment within days. 🚨 The marimo RCE is now being used to deliver a previously undocumented NKAbuse variant via HuggingFace Spaces. 👀 What the Sysdig Threat Research Team observed: ➝ 662 exploit events from April 11–14 across 10 countries ➝ Credential harvesting from environment variables and .env files ➝ Multiple reverse shell attempts across ports and techniques ➝ Lateral movement into PostgreSQL and Redis using leaked credentials ➝ NKAbuse malware deployed via a typosquatted HuggingFace Space ⏱️ How the attack happened: ➝ RCE used to gain shell access ➝ Credential extraction from environment variables and .env files ➝ Reverse shell attempts followed by pivot to databases ➝ PostgreSQL and Redis accessed using stolen credentials ➝ Malware delivered via remote script execution 💥 Why this matters: ➝ Exploitation progressed from access to malware within days ➝ AI/ML environments are being actively targeted ➝ Trusted platforms like HuggingFace are used for payload hosting ➝ A single compromised service can expose broader infrastructure 🛡️ What to do: ➝ Upgrade marimo to ≥ 0.23.0 ➝ Rotate exposed credentials ➝ Hunt for ~/.kagent/ and persistence artifacts ➝ Monitor for reverse shells and credential access 🎯 Takeaway: A single exposed AI/ML service can quickly lead to credential theft, lateral movement, and malware deployment, making behavioral detection and credential hygiene critical. ↳ https://okt.to/4UtxzY

    • No alternative text description for this image
  • View organization page for Sysdig

    61,213 followers

    AI can help cloud security teams move faster, but only if it helps them understand what matters and what to do next. 🚀 Our latest article breaks down how teams can use AI to manage cloud security threats by: 🔹 Summarizing threats in plain language 🔹 Connecting related events into incident-level context 🔹 Showing who and what is impacted 🔹 Guiding response with actionable next steps Because faster threat management starts with better context, not more alerts. Read the article: https://okt.to/Qa3gfY #AISecurity #CloudSecurity

    • How to use AI to manage cloud security threats
  • View organization page for Sysdig

    61,213 followers

    We’ve officially hit the limits of human-scaled security. What comes next moves at machine speed. 🗓️ The Sysdig 2026 Cloud-Native Security and Usage Report drops April 16.

  • View organization page for Sysdig

    61,213 followers

    What keeps cloud apps running at scale? ☁️ In this video, Kat Zivkovic breaks down what Kubernetes is and why it matters for modern applications. In under a minute, you’ll learn: 🔹 What Kubernetes is 🔹 How it manages containers automatically 🔹 The key building blocks, including clusters, nodes, pods, and the control plane If you’ve ever needed a simpler way to explain Kubernetes, this is a great place to start. Watch the full video 👉 https://okt.to/LWOU2D #Kubernetes

  • View organization page for Sysdig

    61,213 followers

    Back from KubeCon Europe, and we're still thinking about Lumin Nights. ✨ An evening of great food, music, and even better conversations with some of the sharpest minds in cloud-native security. This was exactly the kind of night that reminds us why this community is so special. We're still riding the high from this one. Thank you TrueFullstaq for the partnership! #KubeConEU

  • View organization page for Sysdig

    61,213 followers

    Podcast 🤝 runtime security 🤝 our CISO Sergej Epp Yeahhhh … we’re totally into this! Big thanks to Cloud Security Podcast for having him on!

    View organization page for Cloud Security Podcast

    14,681 followers

    Sergej Epp ran a hackathon inside his security team at Sysdig. Not to build product. To find out what his own team could do with AI if nobody said no. The use cases that came out surprised him. His argument: security teams keep waiting for a vendor to solve the AI problem for them. The teams that will win are the ones experimenting internally right now, building their own feedback loops, their own automation, their own version of YOLO mode for defence. The question isn't what AI can do for security in theory. It's what your team would build if you gave them a day to try. Follow Cloud Security Podcast for weekly conversations with the practitioners on the frontline of this. #cloudsecurity #CISO #cybersecurity

    • No alternative text description for this image
  • View organization page for Sysdig

    61,213 followers

    Attacks are moving faster than most teams can respond. As disclosure-to-exploitation windows collapse, supply chains weaken, and AI introduces new blind spots, risk is accelerating fast. On April 9, join Sysdig Threat Research expert Crystal Morin and CISO in Residence Conor Sherman for a live breakdown of what’s actually impacting risk right now: → How fast attackers are operationalizing new vulnerabilities → What recent supply chain attacks reveal about “trusted” tools → Where AI is quietly expanding your attack surface Security dominated the headlines in March. Come get the context behind the news and what to do next. Bring your questions. Leave with answers you can act on.

    The Future of Threats: The April Security Briefing

    The Future of Threats: The April Security Briefing

    www.linkedin.com

  • View organization page for Sysdig

    61,213 followers

    🚨 No PoC. No CVE. STILL exploited in under 10 hours. 🚨 A critical flaw in the marimo OSS Python notebook platform was disclosed on April 8. Less than 10 hours later, an attacker was already stealing credentials. 👀 What the Sysdig Threat Research Team observed: ➝ Unauthenticated RCE via a single WebSocket endpoint (/terminal/ws) ➝ Direct interactive shell access, no payload crafting needed ➝ Exploit built purely from advisory details ➝ First exploitation attempt observed within 9h 41m of advisory publication ⏱️ How the attack happened: ➝ Initial connection to validate access (scripted PoC markers) ➝ Rapid shift to hands-on keyboard exploration ➝ Immediate targeting of sensitive files (.env) ➝ Credential exfiltration within 3 minutes ➝ Follow-up session to revalidate and recheck access 💥 Why this matters: ➝ Attackers are watching advisories beyond just the high-profile targets ➝ Advisory transparency = attacker acceleration ➝ No CVE ≠ No risk ➝ Interactive access drastically speeds up post-exploitation 🛡️ What to do: ➝ Upgrade marimo to ≥ 0.23.0 immediately ➝ Rotate any credentials stored in .env or environment variables ➝ Do not expose notebook platforms directly to the internet without an authentication layer ➝ Restrict or disable terminal WebSocket access ➝ Monitor for unexpected connections to /terminal/ws 🎯 The takeaway: We’re watching exploitation timelines collapse in real time. This mirrors recent cases (like Langflow) but more than 2x faster. Attackers aren’t waiting for PoCs anymore. They’re reading advisories and building exploits on the fly. Full breakdown >>> https://okt.to/WdRzxp #ThreatResearch

    • No alternative text description for this image

Similar pages

Browse jobs

Funding

Sysdig 9 total rounds

Last Round

Series G

US$ 350.0M

See more info on crunchbase