

writing
October 27, 2023
The Kubernetes CVE-2023-3676 Windows command injection vulnerability - exploitation and prevalence

emerging vulnerabilities
October 13, 2023
The Confluence CVE-2023-22515 vulnerability: Overview, detection, and remediation

research
October 11, 2023
Following attackers’ (Cloud)trail in AWS: Methodology and findings in the wild










writing
May 16, 2023
Attacking and securing cloud identities in managed Kubernetes part 1: Amazon EKS

emerging vulnerabilities
May 10, 2023
The OverlayFS vulnerability CVE-2023-0386: Overview, detection, and remediation





open source
March 30, 2023
Identify and remediate common cloud risks with the Datadog Cloud Security Atlas





open source software
February 14, 2023
Announcing GuardDog 1.0, with npm support, new heuristics, and easier CI integration

research
February 6, 2023
Discovering a weakness leading to a partial bypass of the login rate limiting in the AWS Console


open source software
December 29, 2022
Datadog Security Labs 2022 in review: Highlights from our inaugural year

research
December 21, 2022
A retrospective on public cloud breaches of 2022, with Rami McCarthy and Houston Hopkins


writing
December 1, 2022
Attacker persistence in Kubernetes using the TokenRequest API: Overview, detection, and prevention

emerging vulnerabilities
November 23, 2022
Investigating a backdoored PyPi package targeting FastAPI applications


open source software
November 15, 2022
Finding malicious PyPI packages through static code analysis: Meet GuardDog

emerging vulnerabilities
November 1, 2022
The OpenSSL punycode vulnerability (CVE-2022-3602): Overview, detection, exploitation, and remediation


research
October 11, 2022
Improving your AWS Security posture: Key learnings from the State of AWS Security study






open source software
August 13, 2022
Introducing Threatest, a CLI and Go framework for end-to-end testing of threat detection rules



emerging vulnerabilities
June 7, 2022
The Confluence RCE vulnerability (CVE-2022-26134): Overview, detection, and remediation

emerging vulnerabilities
April 1, 2022
The Spring4Shell vulnerability: Overview, detection, and remediation


emerging vulnerabilities
January 28, 2022
The PwnKit vulnerability: Overview, detection, and remediation

emerging vulnerabilities
January 28, 2022
The Dirty Pipe vulnerability: Overview, detection, and remediation


emerging vulnerabilities
December 14, 2021
The Log4j Log4Shell vulnerability: Overview, detection, and remediation

work with us
We're always looking for talented people to collaborate with
featured positions
-
Staff Security Engineer - Remote Configuration
Security - Engineering
-
Detection Engineer 2 - Cloud SIEM
Security - Engineering
-
Detection Engineer 2 - CSM
Security - Engineering
-
Director, Security Engineering
Security - Engineering
-
Engineering Manager I, Core Security Response
Security - Engineering
-
Engineering Manager I - Product Detection Engineering
Security - Engineering
We have 15 positions