Blog page

eBPF Cheat Sheet
A compilation of useful eBPF commands for a DevSecOps workflow
Read more
Aya Rust tutorial Part Four XDP Hello World
In the 4th part of the series, learn how to build an XDP program that prints a message every time it receives a packet on an interface
Read more
Modernizing BPF for the next 10 years
Explore the future development and modernization of BPF over the next decade, including proposed enhancements, and reflect on its evolution and current capabilities
Read more
Profiling Libraries With eBPF: Detecting Zero-Day Exploits and Backdoors
Learn how to use eBPF for runtime application security to detect library profile deviations
Read more
Wie eBPF die Logdaten-Sammlung revolutioniert
Erfahren Sie, wie eBPF die Protokoll- und Metrikerfassung revolutioniert hat
Read more
Detecting Advanced Persistent Threats (APTs) in Financial Systems with eBPF
Explore how eBPF enhances security in Kubernetes for financial systems by detecting Advanced Persistent Threats (APTs)
Read more
Leveraging eBPF for DevSecOps
Learn how eBPF's raw data can be combined with Cloud APIs can allow users to understand application-layer identity, provide real-time security, pinpoint problem origins and stop threats with surgical, active response
Read more
Tetragon Process Lifecycle Observation: eBPF Part
Learn how Tetragon detects process creation and termination using eBPF
Read more
Using Tc-Bpf Program To Redirect Dns Traffic In Docker Containers
A practical guide for implementing DNS redirection amd using TC-BPF to enhance network control within containerized environments
Read more
Optimizing Local Socket Communication: SOCKMAP and eBPF
A detailed overview of how SOCKMAP works in conjunction with eBPF to splice sockets, allowing for streamlined communication between different network namespaces or within a single namespace
Read more