Blog page
Re-implementing my Linux Rust scheduler in eBPF
Learn how a rust-based Linux scheduler was re-implemented with BPF
Read moreA deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability
Learn about the discovery of CVE-2023-2163, a vulnerability within the eBPF verifier, what the root-cause analysis process looked like, and what was done to fix the issue
Read moreextended Berkeley Packet Filter (eBPF) for Cloud Computing
Learn about eBPF and how it is used today in cloud computing
Read moreeBPF Insights Into Real-Time SSL/TLS Monitoring
Learn about how eBPF can help intercept and monitor SSL/TLS encrypted traffic
Read moreCrowdStrike: A Wake-Up Call for eBPF-Based Endpoint Security
Learn about the underlying causes of the adverse impact of cybersecurity attacks on organizations and how eBPF can help tackle these attacks
Read moreCould eBPF Save Us From CrowdStrike-Style Disasters?
The New Stack discusses the potential of eBPF to provide deep visibility into system operations, thereby helping to prevent and mitigate security incidents similar to the CrowdStrike outage
Read moreA look inside the BPF verifier
Learn about the BPF verifier and how it works
Read moreComparing eBPF and Kernel Modules for Application Vulnerability Detection and Attack Monitoring
A comparison between eBPF and Kernel modules across various factors, assessing their viability as a context capture tool for application security vulnerability detection and attack monitoring purposes
Read moreNo More Blue Fridays
Brendan Gregg discusses the recent Windows outage caused by a kernel update and advocates for eBPF to prevent such crashes, enhancing software reliability in Linux and Windows
Read moreRecent CrowdStrike Outage Emphasizes the Need for eBPF-Based Sensors
Global IT disruption caused by a Windows security update fuels debate on adopting eBPF for more resilient endpoint protection
Read more