blogs

Insights at Cloud Speed

Critical marimo RCE (CVE-2026-39987) exploited within 10 hours of disclosure. Sysdig TRT details real-world attacks, credential theft in minutes, and what defenders must do now.

Marimo OSS Python Notebook RCE: From Disclosure to Exploitation in Under 10 Hours

Sysdig Threat Research Team
|
April 9, 2026
Marimo OSS Python Notebook RCE: From Disclosure to Exploitation in Under 10 Hours
TeamPCP expands: Supply chain compromise spreads from Trivy to Checkmarx GitHub Actions

TeamPCP expands: Supply chain compromise spreads from Trivy to Checkmarx GitHub Actions

Sysdig Threat Research Team
|
March 23, 2026
TeamPCP expands: Supply chain compromise spreads from Trivy to Checkmarx GitHub Actions

Runtime security for AI coding agents: Protecting AI-assisted development

Eric Carter
|
March 23, 2026
Runtime security for AI coding agents: Protecting AI-assisted development

CVE-2026-33017: How attackers compromised Langflow AI pipelines in 20 hours

Sysdig Threat Research Team
|
March 19, 2026
CVE-2026-33017: How attackers compromised Langflow AI pipelines in 20 hours
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CVE-2026-39987 update: How attackers weaponized marimo to deploy a blockchain botnet via HuggingFace
April 15, 2026
Michael Clark

CVE-2026-39987 update: How attackers weaponized marimo to deploy a blockchain botnet via HuggingFace

Cloud detection & response
Cloud Security
Threat Research
Kubernetes 1.36 - New security features
April 15, 2026
Victor Jimenez Cerrada

Kubernetes 1.36 - New security features

Cloud Security
Masterclass: AI is more than ChatGPT and LLMs
April 15, 2026
Sysdig Team

Masterclass: AI is more than ChatGPT and LLMs

Cloud Security
How Financial Services Organizations Can Stay Compliant Without Sacrificing Security
April 15, 2026
Eric Carter

How Financial Services Organizations Can Stay Compliant Without Sacrificing Security

Cloud Security
Compliance
Use in-use vulnerability prioritization to focus on critical risks
April 14, 2026
Matt Kim

Use in-use vulnerability prioritization to focus on critical risks

Cloud Security
Next-gen container security: Why cloud context matters
April 14, 2026
Matt Kim

Next-gen container security: Why cloud context matters

Cloud Security
Kubernetes & Container Security

Like what you see?