open-menu
closeme
File Download Detected via Defend for Containers
calendar
Feb 12, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Command and Control
Tactic: Execution
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Modification of Persistence Relevant Files Detected via Defend for Containers
calendar
Feb 12, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Persistence
Tactic: Execution
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Payload Execution via Shell Pipe Detected by Defend for Containers
calendar
Feb 12, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Tactic: Command and Control
Tactic: Defense Evasion
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Suspicious Echo or Printf Execution Detected via Defend for Containers
calendar
Feb 12, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Persistence
Tactic: Execution
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Suspicious Process Execution Detected via Defend for Containers
calendar
Feb 12, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Defense Evasion
Tactic: Execution
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Tunneling and/or Port Forwarding Detected via Defend for Containers
calendar
Feb 12, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Command and Control
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Kubelet Certificate File Access Detected via Defend for Containers
calendar
Feb 10, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Discovery
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Potential Direct Kubelet Access via Process Arguments Detected via Defend for Containers
calendar
Feb 10, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Tactic: Discovery
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Potential Kubeletctl Execution Detected via Defend for Containers
calendar
Feb 10, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Tactic: Discovery
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Encoded Payload Detected via Defend for Containers
calendar
Feb 9, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Defense Evasion
Tactic: Execution
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
File Creation and Execution Detected via Defend for Containers
calendar
Feb 9, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Tactic: Command and Control
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Interactive Privilege Boundary Enumeration Detected via Defend for Containers
calendar
Feb 9, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Discovery
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Kubelet Pod Discovery Detected via Defend for Containers
calendar
Feb 9, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Discovery
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Service Account Namespace Read Detected via Defend for Containers
calendar
Feb 9, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Discovery
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Service Account Token or Certificate Read Detected via Defend for Containers
calendar
Feb 9, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Credential Access
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Shell Command-Line History Deletion Detected via Defend for Containers
calendar
Feb 9, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Defense Evasion
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Suspicious Interpreter Execution Detected via Defend for Containers
calendar
Feb 9, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Tactic: Command and Control
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
System Path File Creation and Execution Detected via Defend for Containers
calendar
Feb 9, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Tactic: Command and Control
Tactic: Defense Evasion
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Tool Installation Detected via Defend for Containers
calendar
Feb 9, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Web Server Child Shell Spawn Detected via Defend for Containers
calendar
Feb 9, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Persistence
Tactic: Execution
Tactic: Command and Control
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Potential Cluster Enumeration via jq Detected via Defend for Containers
calendar
Feb 4, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Discovery
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Curl SOCKS Proxy Detected via Defend for Containers
calendar
Jan 27, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Command and Control
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Direct Interactive Kubernetes API Request Detected via Defend for Containers
calendar
Jan 27, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Tactic: Discovery
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
DNS Enumeration Detected via Defend for Containers
calendar
Jan 27, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Discovery
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Environment Variable Enumeration Detected via Defend for Containers
calendar
Jan 27, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Discovery
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Tool Enumeration Detected via Defend for Containers
calendar
Jan 27, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Discovery
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Cloud Credential Search Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Credential Access
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Container Management Utility Execution Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Container Workload Protection
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
DebugFS Execution Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Dynamic Linker Modification Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Defense Evasion
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
File Execution Permission Modification Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Tactic: Defense Evasion
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Interactive Exec Into Container Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Interactive Shell Spawn Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Mount Execution Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Netcat File Transfer or Listener Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Execution
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Potential notify_on_release Container Escape Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Potential release_agent Container Escape Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Sensitive File Compression Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Collection
Tactic: Credential Access
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Sensitive Keys Or Passwords Search Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Credential Access
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
SSH Authorized Key File Activity Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Persistence
Tactic: Lateral Movement
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Suspicious Network Tool Launch Detected via Defend for Containers
calendar
Jan 26, 2026
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Discovery
Tactic: Command and Control
Tactic: Reconnaissance
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
to-top