Blog page
EBPF For Security: Evolution Or Revolution?
Explore eBPF's rise as a pivotal tool for Linux kernel security. Learn about its transition from a network packet filter to a powerful tool for tracing and analysing system activity, and its transformative role in modern cloud and internet security
Read moreBPFAgent: eBPF for Monitoring at DoorDash
Learn how DoorDash built BPFAgent, an eBPF-based tool, allowing them to deploy eBPF probes within their Kubernetes clusters for enhanced network traffic monitoring at the infrastructure level
Read morePerformant and Programmable Telco Networking with eBPF
Learn how eBPF can help provide improved performance, simplified operations, and complete visibility to Telcos that want to go Cloud Native
Read moreUse our suite of eBPF libraries
Learn about Trail of Bits suite of open-source libraries designed to streamline the creation and deployment of eBPF applications
Read moreHow eBPF Improves Observability within Kubernetes
Dive into what eBPF is, how it improves Kubernetes observability and learn how to implement an eBPF program to monitor the traffic of your Kubernetes cluster
Read moreSecuring PyTorch Models with eBPF
Annoucning secimport — a toolkit for creating and running sandboxed applications in Python that utilizes eBPF (bpftrace) to secure Python runtimes
Read moreUsing eBPF in unprivileged Pods
Learn how to use eBPF object pinning to utilize eBPF in unprivileged Pods
Read moreCatch Performance Regressions: Benchmark eBPF Program
Learn how to prevent a major performance regression in production by benchmarking eBPF and userspace applications
Read moreDetecting BPFDoor Backdoor Variants Abusing BPF Filters
A detailed anaylisis of advanced persistent threat (APT) group Red Menshen’s different variants of backdoor BPFDoor as it evolves since it was first documented in 2021
Read moreDeep application visibility, powered by eBPF
Learn how Kodem utilize eBPF for analyzing how applications interact at runtime
Read more