Imagine a scenario where you monitor how many times your eBPF-based security programs block sensitive actions, such as attempts to execute binaries or elevate privileges to sudo.| ebpfchirp.substack.com