blogs

Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM

Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
What’s New in Sysdig – February 2023
February 23, 2023
Michael Rudloff

What’s New in Sysdig – February 2023

Sysdig Features
What’s New in Sysdig – February 2023
Prometheus and Kubernetes Metrics Ingestion
February 23, 2023
Victor Hernando

Prometheus and Kubernetes Metrics Ingestion

Monitoring
Prometheus and Kubernetes Metrics Ingestion
OWASP Kubernetes Top 10
February 21, 2023
Nigel Douglas

OWASP Kubernetes Top 10

Compliance
Kubernetes & Container Security
Threat Research
OWASP Kubernetes Top 10
How to Monitor Kubernetes Control Plane with Sysdig
February 16, 2023
Victor Hernando

How to Monitor Kubernetes Control Plane with Sysdig

Monitoring
How to Monitor Kubernetes Control Plane with Sysdig
The Cloud Monitoring Journey
February 15, 2023
Emanuela Zaccone

The Cloud Monitoring Journey

Monitoring
The Cloud Monitoring Journey
Vulnerability Prioritization – Combating Developer Fatigue
February 14, 2023
Miguel Hernández

Vulnerability Prioritization – Combating Developer Fatigue

Kubernetes & Container Security
Vulnerability Prioritization – Combating Developer Fatigue

Like what you see?