blogs
Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Meet the Research behind our Threat Research Team
April 26, 2024
Miguel Hernández
Meet the Research behind our Threat Research Team
Threat Research

Cloud Security Regulations in Financial Services
April 22, 2024
Rayna Stamboliyska
Cloud Security Regulations in Financial Services
Cloud Security
Compliance

From Air Force to Sysdig: A Career in Cybersecurity
April 18, 2024
Crystal Morin
From Air Force to Sysdig: A Career in Cybersecurity
No items found.

Active Cloud Risk: Why Static Checks Are Not Enough
April 16, 2024
Ryan Davis
Active Cloud Risk: Why Static Checks Are Not Enough
Cloud Security

Why Runtime Security Should be a Top Priority for CISOs
April 16, 2024
Matt Stamper
Why Runtime Security Should be a Top Priority for CISOs
Cloud Security

What’s New in Kubernetes 1.30?
April 15, 2024
Nigel Douglas
What’s New in Kubernetes 1.30?
Kubernetes & Container Security
