blogs
Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Introducing Managed Policies for Sysdig Secure
August 24, 2022
Nigel Douglas
Introducing Managed Policies for Sysdig Secure
Cloud Security
Compliance
Kubernetes & Container Security
Sysdig Features

What’s new in Sysdig – August 2022
August 23, 2022
Joshua Ma
What’s new in Sysdig – August 2022
Sysdig Features

Sysdig launches Partner Technical Accreditation Program
August 23, 2022
Akhil Desai
Sysdig launches Partner Technical Accreditation Program
Sysdig Features

Kubernetes 1.25 – What’s new?
August 16, 2022
Daniel Simionato
Kubernetes 1.25 – What’s new?
Open Source

Blackhat 2022 recap – Trends and highlights
August 12, 2022
Miguel Hernández
Blackhat 2022 recap – Trends and highlights
Cloud Security
Compliance
Kubernetes & Container Security
Open Source
Threat Research

