blogs

Insights at Cloud Speed

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Kubernetes 1.35 - New security features

Víctor Jiménez Cerrada
|
December 2, 2025
Kubernetes 1.35 - New security features

Return of the Shai-Hulud worm affects over 25,000 GitHub repositories

Alberto Pellitteri
|
November 24, 2025
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Why MCP server security is critical for AI-driven enterprises
July 2, 2025
Conor Sherman

Why MCP server security is critical for AI-driven enterprises

Cloud Security
Why MCP server security is critical for AI-driven enterprises
What’s new in Sysdig — June 2025
June 26, 2025
Sysdig Team

What’s new in Sysdig — June 2025

Cloud Security
What’s new in Sysdig — June 2025
AI-powered CNAPP with Sysdig Sage™
June 25, 2025
Eric Carter

AI-powered CNAPP with Sysdig Sage™

Cloud Security
AI-powered CNAPP with Sysdig Sage™
Revolutionizing Cybersecurity Search with Sysdig Sage™
June 24, 2025
Flavio Mutti

Revolutionizing Cybersecurity Search with Sysdig Sage™

Cloud Security
Revolutionizing Cybersecurity Search with Sysdig Sage™
Sysdig Threat Bulletin: Iranian Cyber Threats
June 23, 2025
Michael Clark

Sysdig Threat Bulletin: Iranian Cyber Threats

Cloud Security
Threat Research
Sysdig Threat Bulletin: Iranian Cyber Threats
The end of the prioritization-only era: Vulnerability management needs action
June 23, 2025
Matt Kim

The end of the prioritization-only era: Vulnerability management needs action

Cloud Security
Kubernetes & Container Security
Sysdig Features
The end of the prioritization-only era: Vulnerability management needs action

Like what you see?