eBPF versus Kernel Extensions

A vibrant illustration depicting two bees with blue wings and yellow-black stripes near a large pink flower with green leaves. The background is a gradient of blue and pink, with upwind in white text in the upper right corner.

Recent events in the world of cybersecurity have brought an influx of attention to a technology known as kernel extensions, and the serious risks that can arise when third-party programs that utilize this technology experience bugs and incompatibilities. So today, we thought it would be useful to dive into the two main approaches for building “agents” or […]

What Happened with the CrowdStrike Update?

An illustration of Earth at the center with six pink icons connected to it by dotted lines: a computer, a factory, an airplane, a warning symbol, a stethoscope, and a satellite dish. The word upwind is in the top left corner.

A recent CrowdStrike Falcon sensor update has caused a massive Windows Blue Screen of Death (BSOD) outage. CrowdStrike offers endpoint protection and other services that are used on a widespread scale worldwide, and this sensor update issue is causing global issues. Impact There are widespread reports of BSOD error on Windows hosts, all of which […]

Leveraging eBPF for DevSecOps

A surfboard leaning against a palm tree on a beach. The surfboard has a bee illustration. Text on the image reads: Leveraging eBPF for DevSecOps. A blue sky and ocean are in the background.

eBPF is a revolutionary technology, originating from the Linux kernel. It is used to safely and efficiently extend the capabilities of the kernel without requiring changing the kernel source code or loading kernel modules/extensions. Today, eBPF is used extensively to: eBPF-Enriched Context  eBPF is the base data layer that is needed in runtime cloud security. […]