blogs

Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM

Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
AWS recognizes Sysdig as an Amazon Linux 2023 Service Ready Partner
March 15, 2023
Eric Carter

AWS recognizes Sysdig as an Amazon Linux 2023 Service Ready Partner

Cloud Security
Kubernetes & Container Security
AWS recognizes Sysdig as an Amazon Linux 2023 Service Ready Partner
Why Companies Still Struggle with Least Privilege in the Cloud
March 14, 2023
Miguel Hernández

Why Companies Still Struggle with Least Privilege in the Cloud

Cloud Security
Compliance
Why Companies Still Struggle with Least Privilege in the Cloud
Easily Monitor Google Cloud with Sysdig’s Managed Prometheus
March 8, 2023
Victor Hernando

Easily Monitor Google Cloud with Sysdig’s Managed Prometheus

Monitoring
Easily Monitor Google Cloud with Sysdig’s Managed Prometheus
Bypassing Network Detection with Graftcp
March 7, 2023
Biagio Dipalma

Bypassing Network Detection with Graftcp

Cloud Security
Kubernetes & Container Security
Threat Research
Bypassing Network Detection with Graftcp
Why the Wiz/SentinelOne Partnership Validates the Sysdig Approach
March 7, 2023
Suresh Vasudevan

Why the Wiz/SentinelOne Partnership Validates the Sysdig Approach

Kubernetes & Container Security
Why the Wiz/SentinelOne Partnership Validates the Sysdig Approach
Millions wasted on Kubernetes resources
March 2, 2023
Javier Martínez

Millions wasted on Kubernetes resources

Monitoring
Millions wasted on Kubernetes resources

Like what you see?