blogs
Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Prometheus Exporters in Sysdig Monitor
March 2, 2023
Victor Hernando
Prometheus Exporters in Sysdig Monitor
Monitoring

MITRE ATT&CK and D3FEND for Cloud and Containers
March 1, 2023
Nigel Douglas
MITRE ATT&CK and D3FEND for Cloud and Containers
Cloud Security
Kubernetes & Container Security

SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
February 28, 2023
Alberto Pellitteri
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
Cloud Security
Threat Research

Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK
February 28, 2023
Nigel Douglas
Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK
Cloud Security
Open Source

ChatGPT as your Falco Consultant
February 24, 2023
Miguel Hernández
ChatGPT as your Falco Consultant
Kubernetes & Container Security
Open Source

