blogs
Insights at Cloud Speed

Understanding CVE-2025-49844: “RediShell” Critical Remote Code Execution in Redis
Sysdig Threat Research Team
|
October 7, 2025
Understanding CVE-2025-49844: “RediShell” Critical Remote Code Execution in Redis

Shai-Hulud: The novel self-replicating worm infecting hundreds of NPM packages
Alberto Pellitteri and Michael Clark
|
September 16, 2025
Shai-Hulud: The novel self-replicating worm infecting hundreds of NPM packages

Connecting runtime to source: Sysdig and Semgrep integration
Christian Laffin
|
July 29, 2025
Connecting runtime to source: Sysdig and Semgrep integration

Fix what matters, faster: How Sysdig and Semgrep are unifying security without silos – from code to runtime
Ryan Davis
|
July 29, 2025
Fix what matters, faster: How Sysdig and Semgrep are unifying security without silos – from code to runtime
join our newsletter
Stay up to date– subscribe to get blog updates now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Understanding CVE-2025-49844: “RediShell” Critical Remote Code Execution in Redis
October 7, 2025
Sysdig Threat Research Team
Understanding CVE-2025-49844: “RediShell” Critical Remote Code Execution in Redis
Threat Research

How Sysdig secures your containers and Kubernetes
October 7, 2025
Matt Kim
How Sysdig secures your containers and Kubernetes
Cloud Security
Kubernetes & Container Security

Sysdig Security Briefing: October 2025
October 6, 2025
Crystal Morin
Sysdig Security Briefing: October 2025
Cloud Security
Threat Research

Cloud security, the right way: The 3 pillars of real-time defense
October 6, 2025
Sysdig Team
Cloud security, the right way: The 3 pillars of real-time defense
Cloud Security

Open Source Spotlight: Bringing web application security to Falco with Falcoya's Nginx plugin
October 2, 2025
Mike Watson & Takao Shimizu
Open Source Spotlight: Bringing web application security to Falco with Falcoya's Nginx plugin
Open Source
Cloud Security

Malicious NPM packages: Are you exposed?
September 25, 2025
Matt Kim
Malicious NPM packages: Are you exposed?
Threat Research
Cloud Security
