blogs

Insights at Cloud Speed

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Kubernetes 1.35 - New security features

Víctor Jiménez Cerrada
|
December 2, 2025
Kubernetes 1.35 - New security features

Return of the Shai-Hulud worm affects over 25,000 GitHub repositories

Alberto Pellitteri
|
November 24, 2025
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
The Urgency of Securing AI Workloads for CISOs
December 2, 2025
Loris Degioanni

The Urgency of Securing AI Workloads for CISOs

Cloud Security
The Urgency of Securing AI Workloads for CISOs
Security briefing: November 2025
December 1, 2025
Crystal Morin

Security briefing: November 2025

No items found.
Security briefing: November 2025
Quantum and the cloud: Science fiction turned security strategy
November 25, 2025
Crystal Morin

Quantum and the cloud: Science fiction turned security strategy

No items found.
Quantum and the cloud: Science fiction turned security strategy
Cloud security, the right way: What the industry should demand (and why "good enough" isn't)
November 24, 2025
Loris Degioanni

Cloud security, the right way: What the industry should demand (and why "good enough" isn't)

Cloud Security
Cloud security, the right way: What the industry should demand (and why "good enough" isn't)
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
November 24, 2025
Alberto Pellitteri

Return of the Shai-Hulud worm affects over 25,000 GitHub repositories

Threat Research
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns
November 20, 2025
Alberto Pellitteri and Michael Clark

Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns

Threat Research
Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns

Like what you see?