blogs
Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sysdig 2024 Global Threat Report
October 22, 2024
Michael Clark
Sysdig 2024 Global Threat Report
Cloud Security
Threat Research

Introducing Custom Controls in Sysdig Secure
October 16, 2024
ashish chakrabortty
Introducing Custom Controls in Sysdig Secure
Cloud Security
Compliance
Kubernetes & Container Security
Sysdig Features

Why the Sysdig Windows agent matters in the cloud
October 10, 2024
Nigel Douglas
Why the Sysdig Windows agent matters in the cloud
Cloud Security
Kubernetes & Container Security

AWS Launches Improvements for Key Quarantine Policy
October 4, 2024
Michael Clark
AWS Launches Improvements for Key Quarantine Policy
Threat Research

Understand AI Threats with MITRE ATLAS
October 3, 2024
Nigel Douglas
Understand AI Threats with MITRE ATLAS
Cloud Security

Detecting and Mitigating Remote Code Execution Exploits in CUPS
September 29, 2024
Michael Clark
Detecting and Mitigating Remote Code Execution Exploits in CUPS
Threat Research
