blogs
Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sysdig is recognized as a Customers' Choice in Gartner® Voice of the Customer for Cloud-Native Application Protection Platforms
January 6, 2025
Durgesh Shukla
Sysdig is recognized as a Customers' Choice in Gartner® Voice of the Customer for Cloud-Native Application Protection Platforms
Cloud Security

Strengthen LLMs with Sysdig Secure
December 20, 2024
ashish chakrabortty
Strengthen LLMs with Sysdig Secure
Cloud Security
Sysdig Features

How a financial leader used the power of the Sysdig platform
December 18, 2024
danijel morotvanski
How a financial leader used the power of the Sysdig platform
Cloud Security
Refresh yourself on 2024’s top cyber attack trends to stay safe in 2025
December 18, 2024
Marla Rosner
Refresh yourself on 2024’s top cyber attack trends to stay safe in 2025
Threat Research


