Discussion about this post

User's avatar
Rainbow Roxy's avatar

This article comes at perfect time. Could you elaborate a bit more on how new rules detect API call obfuscation using ROP gadgets?

Neural Foundry's avatar

Solid curation, especially the K8s discovery/exec correlation rules. The fact that elastic is now layering in process events with audit logs for serice account token access shows how container security matured past just auditing. I've seen similar gaps where behavioral rules cover advanced evasion (ROP, indirect callbacks) but miss deployment patterns where these same techniques are used differently in containerized workloads versus traditional hosts.

No posts

Ready for more?