Blog page

Introduction To Writing eBPF Programs for Linux Security
Learn about eBPF and how to write eBPF programs for Linux security
Read more
A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability
Learn about the discovery of CVE-2023-2163, a vulnerability within the eBPF verifier, what the root-cause analysis process looked like, and what was done to fix the issue
Read more
Go deeper: Linux runtime visibility meets Wireshark
Aqua announces Traceeshark, a plugin for Wireshark that enables visual and interactive analysis of eBPF-based Tracee events, which include kernel-level events and behavioral detections, together with network traffic
Read more
extended Berkeley Packet Filter (eBPF) for Cloud Computing
Learn about eBPF and how it is used today in cloud computing
Read more
Upwind Extends its CNAPP with Agentless Cloud Scanners
Upwind announces Upwind Agentless Cloud Scanners, an additional component to their eBPF-based sensor which provides unified, comprehensive coverage for infrastructure and applications, across clouds, platforms and architectures
Read more
eBPF Foundation Member Spotlight: Isovalent
Liz Rice, Chief Open Source Officer at Isovalent, talks about how Isovalent is using eBPF and why she feels the eBPF Foundation is so important
Read more
eBPF Insights Into Real-Time SSL/TLS Monitoring
Learn about how eBPF can help intercept and monitor SSL/TLS encrypted traffic
Read more
Writing a system call tracer using eBPF
Learn how to build a system call tracer program with eBPF
Read more
CrowdStrike: A Wake-Up Call for eBPF-Based Endpoint Security
Learn about the underlying causes of the adverse impact of cybersecurity attacks on organizations and how eBPF can help tackle these attacks
Read more
Could eBPF Save Us From CrowdStrike-Style Disasters?
The New Stack discusses the potential of eBPF to provide deep visibility into system operations, thereby helping to prevent and mitigate security incidents similar to the CrowdStrike outage
Read more