blogs

Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM

Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Extortion in Cloud Storage
November 29, 2022
Jason Avery

Extortion in Cloud Storage

Cloud Security
Sysdig Features
Threat Research
Extortion in Cloud Storage
How to Monitor the Kubelet
November 23, 2022

How to Monitor the Kubelet

No items found.
How to Monitor the Kubelet
Analysis on Docker Hub malicious images: Attacks through public container images
November 23, 2022
Stefano Chierici

Analysis on Docker Hub malicious images: Attacks through public container images

Cloud Security
Kubernetes & Container Security
Sysdig Features
Threat Research
Analysis on Docker Hub malicious images: Attacks through public container images
What’s New in Sysdig – November 2022
November 23, 2022
Matt Shirilla

What’s New in Sysdig – November 2022

No items found.
What’s New in Sysdig – November 2022
CSPM – Least privilege principle in practice
November 22, 2022
Nigel Douglas

CSPM – Least privilege principle in practice

Cloud Security
Kubernetes & Container Security
Sysdig Features
CSPM – Least privilege principle in practice
Detecting cryptomining attacks “in the wild”
November 18, 2022
Nigel Douglas

Detecting cryptomining attacks “in the wild”

Cloud Security
Kubernetes & Container Security
Threat Research
Detecting cryptomining attacks “in the wild”

Like what you see?