Blog page
Comparing eBPF and Kernel Modules for Application Vulnerability Detection and Attack Monitoring
A comparison between eBPF and Kernel modules across various factors, assessing their viability as a context capture tool for application security vulnerability detection and attack monitoring purposes
Read moreNo More Blue Fridays
Brendan Gregg discusses the recent Windows outage caused by a kernel update and advocates for eBPF to prevent such crashes, enhancing software reliability in Linux and Windows
Read moreRecent CrowdStrike Outage Emphasizes the Need for eBPF-Based Sensors
Global IT disruption caused by a Windows security update fuels debate on adopting eBPF for more resilient endpoint protection
Read moreRecent Crowdstrike Outage Emphasizes the Need for Less Intrusive Malware Behavior Detection Technologies
CrowdStrike outage sparks debate on Windows security, highlighting eBPF's absence and the need for less intrusive alternatives to kernel drivers
Read moreeBPF use cases
Dive deep into the intricacies of eBPF, unraveling its capabilities and exploring its seamless integration within the Kubernetes landscape
Read moreHow Open Source Project Tetragon Is Evolving Security via eBPF
Learn how Tetragon leverages eBPF to revolutionize runtime security, offering deep observability and real-time enforcement for cloud native environments
Read moreeBPF on WSL2 [kernel version 6.x] [Ubuntu] [x64] [Arm64] [2024]
Learn how to develop and run eBPF programs on WSL2
Read moreRun your program in the kernel space with eBPF
Learn how to implement a simple program that will monitor deleted files in the system and print their filename using eBPF
Read moreInstrumenting Python GIL with eBPF
Explore how to measure the impact of the Global Interpreter Lock (GIL) in Python using eBPF
Read moreeBPF map as communication channel
Dive into how eBPF maps can be repurposed for communication between userland applications and kernel drivers on Linux systems
Read more