Datadog Security Labs
banner
securitylabs.datadoghq.com
Datadog Security Labs
@securitylabs.datadoghq.com
Read our Security Labs blog: https://securitylabs.datadoghq.com

Subscribe to our monthly newsletter: https://securitylabs.datadoghq.com/newsletters/
In this post, Lorenzo Susini demonstrates that runtime security can be valuable to identify software supply chain attacks. As an example, this is the process tree of a malicious npm package harvesting credentials
November 5, 2025 at 2:59 PM
fwd:cloudsec is around the corner! Don't miss these 3 talks from Datadog researchers Seth Sec, Katie Knowles, Greg Foss, and Anthony Randazzo.

fwdcloudsec.org/conference/n...

@sethsec.bsky.social
@siigil.bsky.social
@gregfoss.com
June 27, 2025 at 9:02 PM
Interested in malicious software packages? Our open-source dataset just hit over 5,000 samples of malicious npm and PyPI packages!

github.com/DataDog/mali...
March 4, 2025 at 9:06 AM
The Datadog Security Digest is a monthly, practitioner-focused newsletter.

Don't miss our February edition going live tomorrow!

securitylabs.datadoghq.com/newsletters/...
February 26, 2025 at 11:55 AM
We're also releasing a new open-source tool, whoAMI-scanner, to scan for malicious AMIs in your environment!

github.com/DataDog/whoA...
February 12, 2025 at 3:29 PM
"Tales from the cloud trenches: Unwanted visitor"

securitylabs.datadoghq.com/articles/tal...

This post describes an attacker that we've observed in the wild, including a malicious AWS account ID used to create a backdoor IAM role.
December 11, 2024 at 9:43 PM
December 6, 2024 at 12:33 PM