blogs

Insights at Cloud Speed

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Sysdig Threat Research Team
|
December 16, 2025
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Sysdig Threat Research Team
|
December 8, 2025
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Sysdig Threat Research Team
|
December 5, 2025
Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Kubernetes 1.35 - New security features

Víctor Jiménez Cerrada
|
December 2, 2025
Kubernetes 1.35 - New security features
join our newsletter

Stay up to date– subscribe to get blog updates now

Thank you!

We’ve received your submission and will be in touch soon.

SYSDIG FEATURES
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
December 16, 2025
Sysdig Threat Research Team

EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2

Cloud Security
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2
Introducing runtime file integrity monitoring and response with Sysdig FIM
December 16, 2025
Paolo Polidori

Introducing runtime file integrity monitoring and response with Sysdig FIM

Sysdig Features
Kubernetes & Container Security
Introducing runtime file integrity monitoring and response with Sysdig FIM
How to detect multi-stage attacks with runtime behavioral analytics
December 9, 2025
Mike Watson

How to detect multi-stage attacks with runtime behavioral analytics

No items found.
How to detect multi-stage attacks with runtime behavioral analytics
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
December 8, 2025
Sysdig Threat Research Team

EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Threat Research
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js
December 5, 2025
Sysdig Threat Research Team

Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js

Cloud Security
Detecting React2Shell: The maximum-severity RCE Vulnerability affecting React Server Components and Next.js
5 steps to securing AI workloads
December 5, 2025
Marla Rosner

5 steps to securing AI workloads

No items found.
5 steps to securing AI workloads

Like what you see?