blogs

Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM

Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Adding runtime threat detection to Google Kubernetes Engine with Falco
November 5, 2024
Sysdig Team

Adding runtime threat detection to Google Kubernetes Engine with Falco

Cloud Security
Adding runtime threat detection to Google Kubernetes Engine with Falco
Falco’s Journey to CNCF graduation
November 5, 2024
Loris Degioanni

Falco’s Journey to CNCF graduation

Open Source
Falco’s Journey to CNCF graduation
Visibility is key: Strengthening security with Sysdig
November 1, 2024
Gaurang Shirodkar

Visibility is key: Strengthening security with Sysdig

Compliance
Visibility is key: Strengthening security with Sysdig
EMERALDWHALE:  15k Cloud credentials stolen in operation targeting exposed Git config files
October 30, 2024
Miguel Hernández

EMERALDWHALE:  15k Cloud credentials stolen in operation targeting exposed Git config files

Threat Research
EMERALDWHALE:  15k Cloud credentials stolen in operation targeting exposed Git config files
Identity is the Perimeter of the Cloud
October 29, 2024
Crystal Morin & Steve Riley

Identity is the Perimeter of the Cloud

Cloud Security
Identity is the Perimeter of the Cloud
CSI Forensics: Unraveling Kubernetes Crime Scenes
October 23, 2024
Alberto Pellitteri

CSI Forensics: Unraveling Kubernetes Crime Scenes

Threat Research
CSI Forensics: Unraveling Kubernetes Crime Scenes

Like what you see?