Hero background

Engineering Blog: Application security

Tutorials, tips and resources for engineers on cloud technologies and observability

Background wave overlay
Application security

CVE-2025-55182: React2Shell Critical Vulnerability — what it is and what to do

React2Shell CVE-2025-55182 exposes servers to remote code execution. Learn risks, impacted frameworks, and urgent remediation steps.

Read now

Supply chain security: How to detect malicious software packages with Dynatrace

Boost supply chain security with Dynatrace using real-time detection and automated workflows against malicious packages.

Read now

Kubernetes security essentials: Container misconfigurations – From theory to exploitation

Learn how attackers exploit Kubernetes container misconfigurations and how to defend against them with practical examples.

Read now

Snyk integration for Dynatrace: Bridging development and runtime with actionable security notifications

Here's how to use the newly published Snyk integration to create actionable Jira tickets.

Read now

Auth0 monitoring with Dynatrace for more secure authentications

Auth0 monitoring with Dynatrace enables organizations to gain unprecedented insights into authentication, security, and identity events.

Read now

Threat detection in cloud native environments (part 2): How to automate threat management using workflows

This blog covers three building blocks of handling threats: Leave no gaps, get the right eyes on it, and respond quickly.

Read now

Revisiting Spring4Shell: How Cloud Application Detection and Response (CADR) offers multi-layer protection

Using Spring4Shell as an example, discover how Dynatrace can detect and prevent exploitation on multiple layers.

Read now

Mastering sign-in log monitoring: How to secure user identity with Dynatrace

Cyberattacks are increasingly shifting user identities. Discover show sign-in monitoring is crucial to secure user identity.

Read now

Threat detection in cloud native environments: Detecting suspicious Kubernetes service account behavior

By combining different data sources like logs and runtime context, Dynatrace can help improve detection accuracy and create actionable findings.

Read now

Kubernetes security essentials: Kubernetes misconfiguration attack paths and mitigation strategies

A Kubernetes misconfiguration can lead to security vulnerabilities. Learn how attackers exploit them, and how to mitigate attacks.

Read now

Kubernetes security essentials: Understanding Kubernetes security misconfigurations

All too often, Kubernetes misconfigurations become security misconfigurations. Learn why, and how to avoid them.

Read now

NGINX vulnerability: Quickly detect and mitigate IngressNightmare vulnerabilities with Dynatrace

Quickly find and mitigate the IngressNightmare vulnerabilities affecting Kubernetes clusters with Dynatrace.

Read now

VMware Security Advisory VMSA-2025-0004: Quickly find, remediate, and automate

VMSA-2025-0004 contains three vulnerabilities in VMware ESXi. Quickly find affected systems and automate remediation using Dynatrace.

Read now

Hidden indicators: Tracing the emergence of Apache Struts CVE-2024-53677

Apache Struts CVE-2024-53677 introduces risk to the file upload mechanism. We identified early indicators to mitigate its impact.

Read now

The anatomy of broken Apache Struts 2: A technical deep dive into CVE-2024-53677

Broken Apache Struts 2: Technical Deep Dive into CVE-2024-53677

Read now

Generate security events from Dynatrace Security Investigator via OpenPipeline

Detect threats like DNS tunneling with custom Dynatrace security events.

Read now

CrowdStrike BSOD: Quickly find machines impacted by the CrowdStrike issue

The Dynatrace observability and security platform quickly allows you to understand what is running within your environment.

Read now

RegreSSHion vulnerability: Detecting CVE-2024-6387 in OpenSSH

The Qualys Threat Research Unit (TRU) discovered a Remote Unauthenticated Code Execution (RCE) vulnerability.

Read now

Context-aware security incident response with Dynatrace Automations and Tetragon

This blog post demonstrates how to use Dynatrace Automations to build a runbook that combats sophisticated security incidents using honeytokens.

Read now

TTP-based threat hunting with Dynatrace Security Analytics and Falco Alerts solves alert noise

Uncover advanced threat detection strategies using Dynatrace Security Analytics and Falco Alerts, proactively safeguarding your environment.

Read now

Log forensics: Finding malicious activity in multicloud environments with Dynatrace Grail

Detect and investigate malicious activity using Dynatrace Grail, enhancing security posture across multicloud environments.

Read now

New high severity vulnerability, CVE-2022-42889, in Apache Commons Text discovered

Details on a critical vulnerability (CVE-2022-42889) and its impact, emphasizing the need for timely patching and security measures.

Read now

Spring4Shell: Detect and mitigate new zero-day vulnerabilities in the Java Spring Framework

Gain insights into mitigating Spring4Shell vulnerabilities in the Java Spring Framework, safeguarding applications from potential threats.

Read now