blogs
Insights at Cloud Speed

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Kubernetes 1.35 - New security features
Víctor Jiménez Cerrada
|
December 2, 2025
Kubernetes 1.35 - New security features

Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
Alberto Pellitteri
|
November 24, 2025
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Top 5 features to look for in a cloud detection and response solution
May 15, 2025
Mike Watson
Top 5 features to look for in a cloud detection and response solution
Cloud Security

Up and running with Stratoshark in 5 minutes
May 12, 2025
Alex Lawrence
Up and running with Stratoshark in 5 minutes
Cloud Security

Cloud vs. on-prem vulnerability management: Hybrid matters
May 8, 2025
Matt Kim
Cloud vs. on-prem vulnerability management: Hybrid matters
Cloud Security
Kubernetes & Container Security

5 ways AI improves cloud detection and response
May 7, 2025
Eric Carter
5 ways AI improves cloud detection and response
Cloud Security

9 Open source cloud security tools for 2025
April 29, 2025
Sysdig Team
9 Open source cloud security tools for 2025
Cloud Security

