Hero background

Dynatrace Engineering Blog

Tutorials, tips and resources for engineers on cloud technologies and observability

Background wave overlay

AllObservabilityCloud nativeAIOpsOpen sourceApplication security

All

CVE-2025-55182: React2Shell Critical Vulnerability — what it is and what to do

React2Shell CVE-2025-55182 exposes servers to remote code execution. Learn risks, impacted frameworks, and urgent remediation steps.

Read now

How to build workflows that catch bugs early and keep code moving

Learn how integrated observability helps dev teams spot bugs early, boost code quality, and accelerate software delivery.

Read now

AWS publishes Dynatrace-developed blueprint for secure Amazon Bedrock access at scale

AWS publishes Dynatrace-developed blueprint for secure Amazon Bedrock access at scale

Read now

From anomaly to root cause in under a minute

Learn how Dynatrace unifies synthetic monitoring, traces, and logs for instant insights.

Read now

Build Dynatrace® Apps faster, simpler, and smarter with the new App Toolkit

Equip teams to quickly craft custom apps and solutions on the Dynatrace platform.

Read now

Supply chain security: How to detect malicious software packages with Dynatrace

Boost supply chain security with Dynatrace using real-time detection and automated workflows against malicious packages.

Read now

Remediating CVE-2025-3248: How Dynatrace Application Security protects Agentic AI applications

Learn how attackers exploiting CVE-2025-3248 can manipulate AI agent behavior and plant a malicious backdoor in AI-generated source code.

Read now

Sky-high developer productivity with Dynatrace MCP and GitHub Copilot

Sky-high developer productivity with Dynatrace MCP and GitHub Copilot

Read now

Kubernetes security essentials: Container misconfigurations – From theory to exploitation

Learn how attackers exploit Kubernetes container misconfigurations and how to defend against them with practical examples.

Read now
AIOps
Application security

CVE-2025-55182: React2Shell Critical Vulnerability — what it is and what to do

React2Shell CVE-2025-55182 exposes servers to remote code execution. Learn risks, impacted frameworks, and urgent remediation steps.

Read now

Supply chain security: How to detect malicious software packages with Dynatrace

Boost supply chain security with Dynatrace using real-time detection and automated workflows against malicious packages.

Read now

Kubernetes security essentials: Container misconfigurations – From theory to exploitation

Learn how attackers exploit Kubernetes container misconfigurations and how to defend against them with practical examples.

Read now

Snyk integration for Dynatrace: Bridging development and runtime with actionable security notifications

Here's how to use the newly published Snyk integration to create actionable Jira tickets.

Read now

Auth0 monitoring with Dynatrace for more secure authentications

Auth0 monitoring with Dynatrace enables organizations to gain unprecedented insights into authentication, security, and identity events.

Read now

Threat detection in cloud native environments (part 2): How to automate threat management using workflows

This blog covers three building blocks of handling threats: Leave no gaps, get the right eyes on it, and respond quickly.

Read now