blogs
Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Introducing runtime file integrity monitoring and response with Sysdig FIM
Paolo Polidori
|
December 16, 2025
Introducing runtime file integrity monitoring and response with Sysdig FIM

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE vulnerability affecting React Server Components and Next.js
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
5 reasons why Sysdig partners with Proofpoint to enhance cloud security
June 28, 2022
Durgesh Shukla
5 reasons why Sysdig partners with Proofpoint to enhance cloud security
Cloud Security
Sysdig Features

Preventing container runtime attacks with Sysdig’s Drift Control
June 28, 2022
Daniella Pontes
Preventing container runtime attacks with Sysdig’s Drift Control
Kubernetes & Container Security
Sysdig Features

How to Secure AWS Route 53 with Sysdig
June 26, 2022
Brett Wolmarans
How to Secure AWS Route 53 with Sysdig
Cloud Security
Sysdig Features

How to monitor and troubleshoot Fluentd with Prometheus
June 23, 2022
Carlos Adiego
How to monitor and troubleshoot Fluentd with Prometheus
Monitoring

How to detect the containers’ escape capabilities with Falco
June 21, 2022
Stefano Chierici
How to detect the containers’ escape capabilities with Falco
Kubernetes & Container Security
Threat Research

