blogs
Insights at Cloud Speed

Sysdig recognized as a Cloud Security Leader in Latio Tech Cloud Security Market Report
Matt Kim
|
October 16, 2025
Sysdig recognized as a Cloud Security Leader in Latio Tech Cloud Security Market Report

Sysdig MCP Server: Bridging AI and cloud security insights
Álvaro Iradier
|
October 15, 2025
Sysdig MCP Server: Bridging AI and cloud security insights 

Understanding CVE-2025-49844: “RediShell” Critical Remote Code Execution in Redis
Sysdig Threat Research Team
|
October 7, 2025
Understanding CVE-2025-49844: “RediShell” Critical Remote Code Execution in Redis

Shai-Hulud: The novel self-replicating worm infecting hundreds of NPM packages
Alberto Pellitteri and Michael Clark
|
September 16, 2025
Shai-Hulud: The novel self-replicating worm infecting hundreds of NPM packages
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sysdig Threat Bulletin: Iranian Cyber Threats
June 23, 2025
Michael Clark
Sysdig Threat Bulletin: Iranian Cyber Threats
Cloud Security
Threat Research

The end of the prioritization-only era: Vulnerability management needs action
June 23, 2025
Matt Kim
The end of the prioritization-only era: Vulnerability management needs action
Cloud Security
Kubernetes & Container Security
Sysdig Features

Dangerous by default: Insecure GitHub Actions found in MITRE, Splunk, and other open source repositories
June 17, 2025
Stefano Chierici
Dangerous by default: Insecure GitHub Actions found in MITRE, Splunk, and other open source repositories
Cloud Security
Threat Research

Falco is now available as an Amazon EKS add-on
June 17, 2025
Dan Belmonte
Falco is now available as an Amazon EKS add-on
Kubernetes & Container Security

Introducing intelligent vulnerability remediation, powered by Sysdig Sage™
June 16, 2025
Ivan Evsyukov
Introducing intelligent vulnerability remediation, powered by Sysdig Sage™
Sysdig Features

Beyond prioritization: Accelerating vulnerability remediation at the source with AI and runtime context
June 16, 2025
Shantanu Gattani
Beyond prioritization: Accelerating vulnerability remediation at the source with AI and runtime context
Cloud Security
Sysdig Features
