Blog page
eBPF & Tetragon: Tools for detecting XZ Utils CVE 2024-3094 Exploit
Learn how to use Tetragon, an eBPF-based runtime security tool to detect the XZ backdoor in OpenSSH
Read moreResearch Grant from the eBPF Foundation
The eBPF foundation has announced a new academic research grant
Read more#023 - Kubernetes for Humans Podcast with Liz Rice (Isovalent)
Liz Rice jumps on the Kubernetes for Humans podcast to talk about the use cases and future of eBPF
Read moreExploring eBPF Implementation through Linux Source Code
Dive into how eBPF works in the kernel by exploring the Linux source code
Read moreIndustry Voices: Hanging out with Cloud Natives - Insights from KubeCon Europe 2024
Fierce Network highlights key events from KubeCon EU 2024, focusing on eBPF and other significant topics that were central to discussions at the event
Read moreKubeCon Europe: WebAssembly, eBPF Are Huge for Cloud Native
The NewStack highlights KubeCon with a focus how topics like eBPF, AI and WebAssembly were significant topics of interest at the event
Read moreNew State of eBPF Report highlights evolution of eBPF technology
Bill Mulligan, marketing committee at the eBPF Foundation talks about the recently released state of eBPF report and some of the emerging trends coming out of the eBPF ecosystem
Read moreHello eBPF: Auto Layouting Structs (7)
The seventh installment of the Hello eBPF series. In this part, you'll learn about the memory layout and alignment of structs transferred between the kernel and user-land in eBPF
Read moreiptables vs. GoXDP: The Ultimate Packet Filtering Benchmark Setup and Results
Learn about the benchmark environment setup and the results of the Linux firewall tools (iptables and GoXDP). Discover the maximum number of packets that can be dropped per second when CPU utilization reaches 100%
Read moreMonitoring Kubernetes network traffic by using eBPF
Learn how how SkyWalking uses eBPF to monitor network traffic on Kubernetes
Read more