blogs

Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM

Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Look both ways: Preventing suspicious behavior with end-to-end detections
June 7, 2023
Nigel Douglas

Look both ways: Preventing suspicious behavior with end-to-end detections

Cloud Security
Kubernetes & Container Security
Open Source
Sysdig Features
Look both ways: Preventing suspicious behavior with end-to-end detections
Respond Instantly to Kubernetes Threats with Sysdig Live
June 7, 2023
Víctor Jiménez Cerrada

Respond Instantly to Kubernetes Threats with Sysdig Live

Cloud Security
Kubernetes & Container Security
Sysdig Features
Respond Instantly to Kubernetes Threats with Sysdig Live
Sysdig Enriched Process Trees, an Innovative Approach to Threat Detection
June 7, 2023
Víctor Jiménez Cerrada

Sysdig Enriched Process Trees, an Innovative Approach to Threat Detection

Cloud Security
Kubernetes & Container Security
Sysdig Features
Sysdig Enriched Process Trees, an Innovative Approach to Threat Detection
Stop Cloud Breaches in Real Time and Accelerate Investigation and Response with Sysdig CDR
June 7, 2023
Matt Kim

Stop Cloud Breaches in Real Time and Accelerate Investigation and Response with Sysdig CDR

Cloud Security
Kubernetes & Container Security
Open Source
Sysdig Features
Stop Cloud Breaches in Real Time and Accelerate Investigation and Response with Sysdig CDR
Who’s Who in Cloud Security? CSPM, CIEM, CWPP & CNAPP Explained
May 30, 2023
Alba Ferri

Who’s Who in Cloud Security? CSPM, CIEM, CWPP & CNAPP Explained

Cloud Security
Compliance
Kubernetes & Container Security
Sysdig Features
Who’s Who in Cloud Security? CSPM, CIEM, CWPP & CNAPP Explained
Did Your Datadog Bill Explode?
May 24, 2023
Victor Hernando

Did Your Datadog Bill Explode?

Monitoring
Did Your Datadog Bill Explode?

Like what you see?