blogs

Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM

Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Collect critical AWS metrics faster with Sysdig
July 14, 2022
Alan Murphy

Collect critical AWS metrics faster with Sysdig

Monitoring
Sysdig Features
Collect critical AWS metrics faster with Sysdig
How to secure Kubernetes deployment with signature verification
July 12, 2022
Guillermo Palaciooto

How to secure Kubernetes deployment with signature verification

Compliance
Kubernetes & Container Security
Open Source
How to secure Kubernetes deployment with signature verification
Detecting suspicious activity on AWS using cloud logs
July 11, 2022
Michael Isbitski

Detecting suspicious activity on AWS using cloud logs

Cloud Security
Detecting suspicious activity on AWS using cloud logs
How attackers use exposed Prometheus server to exploit Kubernetes clusters
July 5, 2022
Miguel Hernández

How attackers use exposed Prometheus server to exploit Kubernetes clusters

Kubernetes & Container Security
Monitoring
Open Source
How attackers use exposed Prometheus server to exploit Kubernetes clusters
Adapting security to Amazon EKS Anywhere on Bare Metal
June 30, 2022
Eric Carter

Adapting security to Amazon EKS Anywhere on Bare Metal

Kubernetes & Container Security
Adapting security to Amazon EKS Anywhere on Bare Metal
How to monitor nginx in Kubernetes with Prometheus
June 30, 2022
Jesus Ángel Samitier

How to monitor nginx in Kubernetes with Prometheus

Monitoring
Open Source
How to monitor nginx in Kubernetes with Prometheus

Like what you see?