blogs
Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Introducing Vulnerability Management Enhancements for Sysdig Secure: Focus on Action
February 19, 2025
Matt Kim
Introducing Vulnerability Management Enhancements for Sysdig Secure: Focus on Action
Sysdig Features

Top cloud misconfigurations: A CSPM perspective
February 19, 2025
Eric Carter
Top cloud misconfigurations: A CSPM perspective
Cloud Security

Cloud invaders: Spotting compromised users before it’s too late
February 12, 2025
Matt Kim
Cloud invaders: Spotting compromised users before it’s too late
Cloud Security

LLMjacking targets DeepSeek
February 7, 2025
Sysdig Threat Research Team
LLMjacking targets DeepSeek
Cloud Security
Threat Research


