blogs
Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
How to secure every stage of the CI/CD pipeline with Sysdig
December 12, 2024
Marla Rosner
How to secure every stage of the CI/CD pipeline with Sysdig
Cloud Security

Bedrock Slip: Sysdig TRT Discovers CloudTrail Logging Missteps
December 12, 2024
Alessandro Brucato
Bedrock Slip: Sysdig TRT Discovers CloudTrail Logging Missteps
Threat Research

Forging the proverbial bulletproof container
December 11, 2024
Nigel Douglas
Forging the proverbial bulletproof container
Kubernetes & Container Security

Security for Amazon EKS hybrid nodes: Bridging cloud and on-premises Kubernetes security
December 5, 2024
Eric Carter
Security for Amazon EKS hybrid nodes: Bridging cloud and on-premises Kubernetes security
Kubernetes & Container Security

Kubernetes 1.32 – What’s new?
December 5, 2024
Nigel Douglas
Kubernetes 1.32 – What’s new?
Kubernetes & Container Security

Extending Falco for Salesforce
December 3, 2024
Nigel Douglas
Extending Falco for Salesforce
Cloud Security
