blogs

Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM

Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sysdig Named Leader and Outperformer in GigaOm Radar for Container Security
February 21, 2024
Marla Rosner

Sysdig Named Leader and Outperformer in GigaOm Radar for Container Security

No items found.
Sysdig Named Leader and Outperformer in GigaOm Radar for Container Security
The power of prioritization: Why practitioners need CNAPP with runtime insights
February 20, 2024
Marla Rosner

The power of prioritization: Why practitioners need CNAPP with runtime insights

No items found.
The power of prioritization: Why practitioners need CNAPP with runtime insights
SSH-Snake: New Self-Modifying Worm Threatens Networks
February 20, 2024
Miguel Hernández

SSH-Snake: New Self-Modifying Worm Threatens Networks

Threat Research
SSH-Snake: New Self-Modifying Worm Threatens Networks
Ephemeral Containers and APTs
February 19, 2024
Nigel Douglas

Ephemeral Containers and APTs

No items found.
Ephemeral Containers and APTs
Exploring Syscall Evasion – Linux Shell Built-ins
February 14, 2024
Jason Andress

Exploring Syscall Evasion – Linux Shell Built-ins

Threat Research
Exploring Syscall Evasion – Linux Shell Built-ins
Cloud Security and the Power of Runtime Insights
February 13, 2024
Marla Rosner

Cloud Security and the Power of Runtime Insights

No items found.
Cloud Security and the Power of Runtime Insights

Like what you see?