blogs
Insights at Cloud Speed

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Kubernetes 1.35 - New security features
Víctor Jiménez Cerrada
|
December 2, 2025
Kubernetes 1.35 - New security features

Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
Alberto Pellitteri
|
November 24, 2025
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Why MCP server security is critical for AI-driven enterprises
July 2, 2025
Conor Sherman
Why MCP server security is critical for AI-driven enterprises
Cloud Security

What’s new in Sysdig — June 2025
June 26, 2025
Sysdig Team
What’s new in Sysdig — June 2025
Cloud Security

AI-powered CNAPP with Sysdig Sage™
June 25, 2025
Eric Carter
AI-powered CNAPP with Sysdig Sage™
Cloud Security

Revolutionizing Cybersecurity Search with Sysdig Sage™
June 24, 2025
Flavio Mutti
Revolutionizing Cybersecurity Search with Sysdig Sage™
Cloud Security

Sysdig Threat Bulletin: Iranian Cyber Threats
June 23, 2025
Michael Clark
Sysdig Threat Bulletin: Iranian Cyber Threats
Cloud Security
Threat Research

The end of the prioritization-only era: Vulnerability management needs action
June 23, 2025
Matt Kim
The end of the prioritization-only era: Vulnerability management needs action
Cloud Security
Kubernetes & Container Security
Sysdig Features
