blogs
Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
How Financial Services Organizations Can Stay Compliant – Without Sacrificing Security
January 16, 2024
Eric Carter
How Financial Services Organizations Can Stay Compliant – Without Sacrificing Security
Cloud Security
Compliance

Fuzzing and Bypassing the AWS WAF
January 9, 2024
Daniele Linguaglossa
Fuzzing and Bypassing the AWS WAF
Cloud Security
Threat Research

What’s New – December 2023 Recap
December 28, 2023
Mike Watson
What’s New – December 2023 Recap
Cloud Security
Compliance
Kubernetes & Container Security
Open Source
Sysdig Features

What’s New in Sysdig – November 2023
November 30, 2023
Dimitris Vassilopoulos
What’s New in Sysdig – November 2023
Cloud Security
Compliance
Kubernetes & Container Security
Monitoring
Open Source

Sysdig Achieves the Amazon EKS Ready Designation
November 29, 2023
Eric Carter
Sysdig Achieves the Amazon EKS Ready Designation
Kubernetes & Container Security

The Power of Library-Based Vulnerability Detection
November 24, 2023
Joseph Yostos
The Power of Library-Based Vulnerability Detection
Cloud Security
Compliance
Kubernetes & Container Security
Sysdig Features
