blogs
Insights at Cloud Speed

Our customers have spoken: Sysdig rated a Strong Performer in Gartner® Voice of the Customer for Cloud-Native Application Protection Platforms
Marla Rosner
|
January 22, 2026
Our customers have spoken: Sysdig rated a Strong Performer in Gartner® Voice of the Customer for Cloud-Native Application Protection Platforms

How threat actors are using self-hosted GitHub Actions runners as backdoors
Alberto Pellitteri
|
January 13, 2026
How threat actors are using self-hosted GitHub Actions runners as backdoors

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Quantum and the cloud: Science fiction turned security strategy
November 25, 2025
Crystal Morin
Quantum and the cloud: Science fiction turned security strategy
No items found.

Cloud security, the right way: What the industry should demand (and why "good enough" isn't)
November 24, 2025
Loris Degioanni
Cloud security, the right way: What the industry should demand (and why "good enough" isn't)
Cloud Security

Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
November 24, 2025
Alberto Pellitteri
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
Threat Research

Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns
November 20, 2025
Alberto Pellitteri and Michael Clark
Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns
Threat Research

What’s old is new again: How to demystify AI security with AIBOMs
November 20, 2025
Crystal Morin
What’s old is new again: How to demystify AI security with AIBOMs
Cloud Security
Security for AI

Securing Kubernetes with agentic cloud security
November 19, 2025
Eric Carter
Securing Kubernetes with agentic cloud security
Kubernetes & Container Security
AI for cloud security
