Hook, line, and vault: A technical deep dive into the 1Phish kit targeting 1Password users
securitylabs.datadoghq.com/articles/hoo...
Hook, line, and vault: A technical deep dive into the 1Phish kit targeting 1Password users
securitylabs.datadoghq.com/articles/hoo...
Tech impersonators: ClickFix and MacOS infostealers
securitylabs.datadoghq.com/articles/tec...
Tech impersonators: ClickFix and MacOS infostealers
securitylabs.datadoghq.com/articles/tec...
IDE-SHEPHERD is a new open source project to identify malicious VSCode and Cursor extensions at runtime
Announcement: securitylabs.datadoghq.com/articles/ide...
GitHub: github.com/DataDog/IDE-...
Decoding the GitHub recommendations for npm maintainers
securitylabs.datadoghq.com/articles/dec...
by @phrawzty.com
Introducing Pathfinding.cloud, a library of privilege escalation paths in AWS
securitylabs.datadoghq.com/articles/int...
by @sethsec.bsky.social
Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users
securitylabs.datadoghq.com/articles/inv...
Update: A PoC was made available on GitHub by a security engineer. Our post was updated to reflect this new information, along with an illustration of how the exploit works.
CVE-2025-55182 (React2Shell): Remote code execution in React Server Components and Next.js
securitylabs.datadoghq.com/articles/cve...
The November Datadog Security Digest is out!
β’ A 2025 look at real-world Kubernetes version adoption by @mccune.org.uk
β’ Datadog threat roundup: Top insights for Q3 2025
β’ Analyzing network traffic from coding agents
... and more!
securitylabs.datadoghq.com/newsletters/...
A few days ago, a new piece of malware started spreading in npm, compromising and backdooring hundreds of legitimate npm packages and GitHub users. Read the analysis from our security research team:
securitylabs.datadoghq.com/articles/sha...
MUT-4831: Trojanized npm packages deliver Vidar infostealer malware
securitylabs.datadoghq.com/articles/mut...
In this post, Lorenzo Susini demonstrates that runtime security can be valuable to identify software supply chain attacks. As an example, this is the process tree of a malicious npm package harvesting credentials
A runtime security approach to detecting supply chain attacks
securitylabs.datadoghq.com/articles/sup...
by Lorenzo Susini, Detection Engineer
Datadog threat roundup: Top insights for Q3 2025
securitylabs.datadoghq.com/articles/202...
Learnings from recent npm supply chain compromises
securitylabs.datadoghq.com/articles/lea...
The October edition of the Datadog Security Digest is out!
securitylabs.datadoghq.com/newsletters/...
CoPhish: Using Microsoft Copilot Studio as a wrapper for OAuth phishing
securitylabs.datadoghq.com/articles/cop...
by @siigil.bsky.social
Our State of Cloud Security 2025 study is out!
www.datadoghq.com/state-of-clo...
β’ On AWS, 40% of organizations leverage data perimeters
β’ 11% of Google Cloud GKE and 23% of Google Cloud VMs are overprivileged
β’ On Azure, 1.3% of storage containers are public, 58% proactively block public access
The September edition of the Datadog Security Digest is out: securitylabs.datadoghq.com/newsletters/...
In case you missed it, the August edition of the Datadog Security Digest went out last week!
securitylabs.datadoghq.com/newsletters/...
CVE-2025-52882: WebSocket authentication bypass in Claude Code extensions (patched)
securitylabs.datadoghq.com/articles/cla...
Zander Mackie
MCP vulnerability case study: SQL injection in the Postgres MCP server. Comes with a full reproducible proof-of-concept
securitylabs.datadoghq.com/articles/mcp...
by Santiago Mola
Enumerating AWS the quiet way: CloudTrail-free discovery with Resource Explorer
by @frichetten.com
securitylabs.datadoghq.com/articles/enu...
The July edition of the Datadog Security Digest is out!
securitylabs.datadoghq.com/newsletters/...
β’ Cloud image investigator by @sethsec.bsky.social
β’ Our top picks for Black Hat / DEF CON
β’ A benchmark for LLM coding accuracy and security
β’ Malicious Homebrew installation campaign
.. and more
Datadog guide to Hacker Summer Camp 2025, amd the top 50 talks we're excited about
securitylabs.datadoghq.com/articles/hac...
Beyond Mimoβlette: Tracking Mimo's Expansion to Magento CMS and Docker
securitylabs.datadoghq.com/articles/bey...
I SPy: Escalating to Entra ID's Global Admin with a first-party app
securitylabs.datadoghq.com/articles/i-s...
by @siigil.bsky.social
Kubernetes security fundamentals, part 7: Public Key Infrastructure (PKI)
securitylabs.datadoghq.com/articles/kub...
by @mccune.org.uk
CVE-2025-48384: Git vulnerable to arbitrary file write on non-Windows systems
securitylabs.datadoghq.com/articles/git...