
Supply Chain Security
How eBPF-Based Egress Monitoring Would Have Caught the Shai-Hulud npm Worm in Real-Time
September 2025 marked a watershed moment for supply chain security when the Shai-Hulud worm became the first self-replicating malware to propagate through the npm ecosystem. This post examines how Qpoint's eBPF-based data-in-motion security would have detected this attack at the moment of compromise. 

Devin Bernosky
September 26, 2025
The Encryption Paradox
Devin Bernosky
September 9, 2025
Why Running Qtap in Production is Safe - A Deep Dive into eBPF and Privilege Boundaries
Jon Friesen
September 5, 2025
The eBPF Verifier - How Linux Safely Runs User Code in Kernel Space
Jon Friesen
September 2, 2025
The Impossible Proxy - An Egress Journey
Devin Bernosky
September 2, 2025
Security Observability for the Encrypted Cloud
Tyler Flint
April 29, 2025
A Story About Missing Context
Devin Bernosky
April 15, 2025
The Truth is on the Wire
Rob Genova
February 4, 2025
New Year, New User Experience!
Tyler Flint
January 9, 2025
The Hidden Risks of Third-Party API Dependencies
Rob Genova
December 16, 2024
Uncovering the Hidden Footprint of Your Third-Party API Integrations
Devin Bernosky
December 3, 2024
Turning Blind Spots Into Visibility and Insights for SRE Teams
Rob Genova
November 14, 2024
Qpoint Closes Pre-Seed Funding and Launches eBPF-based Monitoring and Control for External APIs and Services
Tyler Flint
October 22, 2024