blogs
Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sysdig Secure-Google Chronicle Integration – Why, What and How
December 7, 2022
Durgesh Shukla
Sysdig Secure-Google Chronicle Integration – Why, What and How
Cloud Security
Kubernetes & Container Security

Comparing GuardDuty & Falco on EKS
December 6, 2022
Nigel Douglas
Comparing GuardDuty & Falco on EKS
Cloud Security

Discovered new BYOF technique to cryptomining with PRoot
December 5, 2022
Biagio Dipalma
Discovered new BYOF technique to cryptomining with PRoot
Cloud Security
Kubernetes & Container Security
Open Source
Threat Research

A day in the life of a Customer Support Detective
December 1, 2022
Patrick Hargett
A day in the life of a Customer Support Detective
Monitoring

How global conflicts influenced cyber attack behaviors
November 30, 2022
Michael Clark
How global conflicts influenced cyber attack behaviors
Cloud Security
Kubernetes & Container Security
Threat Research

