blogs

Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM

Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Guidelines: How to reduce the noise of Falco rules in Sysdig Secure
March 22, 2023
Biagio Dipalma

Guidelines: How to reduce the noise of Falco rules in Sysdig Secure

Kubernetes & Container Security
Sysdig Features
Guidelines: How to reduce the noise of Falco rules in Sysdig Secure
Terraform Security Best Practices
March 21, 2023
Nigel Douglas

Terraform Security Best Practices

Open Source
Terraform Security Best Practices
Why CNAPP Needs Runtime Insights to Shift Left and Shield Right
March 17, 2023
Pawan Shankar

Why CNAPP Needs Runtime Insights to Shift Left and Shield Right

No items found.
Why CNAPP Needs Runtime Insights to Shift Left and Shield Right
Chaos Malware Quietly Evolves Persistence and Evasion Techniques
March 17, 2023
Nicholas Lang

Chaos Malware Quietly Evolves Persistence and Evasion Techniques

Cloud Security
Kubernetes & Container Security
Threat Research
Chaos Malware Quietly Evolves Persistence and Evasion Techniques
Kubernetes CPU Requests & Limits VS Autoscaling
March 16, 2023
Jason Umiker

Kubernetes CPU Requests & Limits VS Autoscaling

Monitoring
Kubernetes CPU Requests & Limits VS Autoscaling
DISA STIG compliance for Docker and Kubernetes with Sysdig Secure
March 15, 2023
Alba Ferri

DISA STIG compliance for Docker and Kubernetes with Sysdig Secure

Cloud Security
Compliance
Kubernetes & Container Security
DISA STIG compliance for Docker and Kubernetes with Sysdig Secure

Like what you see?