blogs

Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM

Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
What’s New in Sysdig – May 2024
May 30, 2024
Dustin Krysak

What’s New in Sysdig – May 2024

Cloud Security
Kubernetes & Container Security
Monitoring
Sysdig Features
What’s New in Sysdig – May 2024
DDoS-as-a-Service: The Rebirth Botnet
May 28, 2024
Sysdig Threat Research Team

DDoS-as-a-Service: The Rebirth Botnet

Cloud Security
Threat Research
DDoS-as-a-Service: The Rebirth Botnet
Connect, Explore, Listen: Gartner Security And Risk Management Summit
May 23, 2024
Anna Belak

Connect, Explore, Listen: Gartner Security And Risk Management Summit

Cloud Security
Connect, Explore, Listen: Gartner Security And Risk Management Summit
Leadership Strategies for Risk Reduction, Transparency, and Speed
May 22, 2024
Crystal Morin

Leadership Strategies for Risk Reduction, Transparency, and Speed

Cloud Security
Compliance
Leadership Strategies for Risk Reduction, Transparency, and Speed
Optimizing Wireshark in Kubernetes
May 21, 2024
Nigel Douglas

Optimizing Wireshark in Kubernetes

Cloud Security
Kubernetes & Container Security
Monitoring
Optimizing Wireshark in Kubernetes
NIS2, DORA & Compliance
May 16, 2024
Rayna Stamboliyska

NIS2, DORA & Compliance

Cloud Security
Compliance
NIS2, DORA & Compliance

Like what you see?