blogs
Insights at Cloud Speed

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Kubernetes 1.35 - New security features
Víctor Jiménez Cerrada
|
December 2, 2025
Kubernetes 1.35 - New security features

Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
Alberto Pellitteri
|
November 24, 2025
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
The Urgency of Securing AI Workloads for CISOs
December 2, 2025
Loris Degioanni
The Urgency of Securing AI Workloads for CISOs
Cloud Security

Security briefing: November 2025
December 1, 2025
Crystal Morin
Security briefing: November 2025
No items found.

Quantum and the cloud: Science fiction turned security strategy
November 25, 2025
Crystal Morin
Quantum and the cloud: Science fiction turned security strategy
No items found.

Cloud security, the right way: What the industry should demand (and why "good enough" isn't)
November 24, 2025
Loris Degioanni
Cloud security, the right way: What the industry should demand (and why "good enough" isn't)
Cloud Security

Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
November 24, 2025
Alberto Pellitteri
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
Threat Research

Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns
November 20, 2025
Alberto Pellitteri and Michael Clark
Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns
Threat Research
