blogs

Insights at Cloud Speed

Our customers have spoken: Sysdig rated a Strong Performer in Gartner® Voice of the Customer for Cloud-Native Application Protection Platforms

Marla Rosner
|
January 22, 2026
Our customers have spoken: Sysdig rated a Strong Performer in Gartner® Voice of the Customer for Cloud-Native Application Protection Platforms

How threat actors are using self-hosted GitHub Actions runners as backdoors

Alberto Pellitteri
|
January 13, 2026
How threat actors are using self-hosted GitHub Actions runners as backdoors

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM

Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Quantum and the cloud: Science fiction turned security strategy
November 25, 2025
Crystal Morin

Quantum and the cloud: Science fiction turned security strategy

No items found.
Quantum and the cloud: Science fiction turned security strategy
Cloud security, the right way: What the industry should demand (and why "good enough" isn't)
November 24, 2025
Loris Degioanni

Cloud security, the right way: What the industry should demand (and why "good enough" isn't)

Cloud Security
Cloud security, the right way: What the industry should demand (and why "good enough" isn't)
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
November 24, 2025
Alberto Pellitteri

Return of the Shai-Hulud worm affects over 25,000 GitHub repositories

Threat Research
Return of the Shai-Hulud worm affects over 25,000 GitHub repositories
Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns
November 20, 2025
Alberto Pellitteri and Michael Clark

Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns

Threat Research
Detecting CVE-2024-1086: The decade-old Linux kernel vulnerability that’s being actively exploited in ransomware campaigns
What’s old is new again: How to demystify AI security with AIBOMs
November 20, 2025
Crystal Morin

What’s old is new again: How to demystify AI security with AIBOMs

Cloud Security
Security for AI
What’s old is new again: How to demystify AI security with AIBOMs
Securing Kubernetes with agentic cloud security
November 19, 2025
Eric Carter

Securing Kubernetes with agentic cloud security

Kubernetes & Container Security
AI for cloud security
Securing Kubernetes with agentic cloud security

Like what you see?