blogs

Insights at Cloud Speed

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Kubernetes 1.35 - New security features

Víctor Jiménez Cerrada
|
December 2, 2025
Kubernetes 1.35 - New security features

Return of the Shai-Hulud worm affects over 25,000 GitHub repositories

Alberto Pellitteri
|
November 24, 2025
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Dangerous by default: Insecure GitHub Actions found in MITRE, Splunk, and other open source repositories
June 17, 2025
Stefano Chierici

Dangerous by default: Insecure GitHub Actions found in MITRE, Splunk, and other open source repositories

Cloud Security
Threat Research
Dangerous by default: Insecure GitHub Actions found in MITRE, Splunk, and other open source repositories
Falco is now available as an Amazon EKS add-on
June 17, 2025
Dan Belmonte

Falco is now available as an Amazon EKS add-on

Kubernetes & Container Security
Falco is now available as an Amazon EKS add-on
Introducing intelligent vulnerability remediation, powered by Sysdig Sage™
June 16, 2025
Ivan Evsyukov

Introducing intelligent vulnerability remediation, powered by Sysdig Sage™

Sysdig Features
Introducing intelligent vulnerability remediation, powered by Sysdig Sage™
Beyond prioritization: Accelerating vulnerability remediation at the source with AI and runtime context
June 16, 2025
Shantanu Gattani

Beyond prioritization: Accelerating vulnerability remediation at the source with AI and runtime context

Cloud Security
Sysdig Features
Beyond prioritization: Accelerating vulnerability remediation at the source with AI and runtime context
Runtime is the real defense, not just posture
June 13, 2025
Marla Rosner

Runtime is the real defense, not just posture

Cloud Security
Kubernetes & Container Security
Runtime is the real defense, not just posture
Top 15 Kubectl plugins for security engineers in 2025
June 11, 2025
Sysdig Team

Top 15 Kubectl plugins for security engineers in 2025

Kubernetes & Container Security
Top 15 Kubectl plugins for security engineers in 2025

Like what you see?