blogs
Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Track risk trends in your container images with Sysdig risk-based vulnerability management
May 24, 2023
Joseph Yostos
Track risk trends in your container images with Sysdig risk-based vulnerability management
Cloud Security
Compliance
Kubernetes & Container Security
Sysdig Features

Day 2 Falco Container Security – Tuning the Rules
May 23, 2023
Nigel Douglas
Day 2 Falco Container Security – Tuning the Rules
Cloud Security
Kubernetes & Container Security
Open Source

Cloud Security: Turns Out We Needed Another Acronym (CNAPP)
May 17, 2023
Anna Belak
Cloud Security: Turns Out We Needed Another Acronym (CNAPP)
Cloud Security
Kubernetes & Container Security

Top metrics for Elasticsearch monitoring with Prometheus
May 5, 2023
Javier Martínez
Top metrics for Elasticsearch monitoring with Prometheus
Monitoring

What’s New in Sysdig – March & April 2023
April 27, 2023
Gonzalo Rocamador
What’s New in Sysdig – March & April 2023
Sysdig Features
