The State of Cloud Security, MCP Risks, and Azure vulnerabilities

Welcome to the October 2025 edition of the Datadog Security Digest!


This month, we've got another set of interesting stories from different corners of the security landscape , including insights into real-world cloud security practices, more risks emerging in the LLM and MCP fields, and some serious weaknesses in cloud security platforms.


This newsletter was created by a real person, not a machine. Your curator of the month is Rory McCune

State of Cloud Security

Datadog's State of Cloud Security report highlights that many organizations continue to leave key resources vulnerable to known exploits and potential attacks, and identifies some of the key practices that can improve their security.

Cloud Security

One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens

Dirk-jan Mollema's research into Azure security and how it was possible to get global admin on every Entra ID tenant is a fascinating look into the complexity of handling IAM at cloud scale, and how serious risks can appear in complex systems.

Adding Determinism and Safety to Uber IAM Policy Changes

Another story on the topic of IAM complexity comes from Uber, in this post that details how they handle policy simulation as a means to reduce the risk of IAM changes.

AI Security

From MCP to Shell

With MCP servers taking off quite rapidly, it's important to understand how they can be abused and some of the vectors that attackers might try to exploit. This article from Veria Labs details some of the risks that might be presented by a malicious MCP server.

First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails

We're also starting to see real-world examples of the malicious MCP servers. In this story, Koi details a malicious MCP server that copied email data that it processed. As with any code that handles sensitive data, it's important to ensure that MCP servers go through proper security reviews.

A small number of samples can poison LLMs of any size

On the more academic side of LLM security, recent research detailed in this post from Anthropic reveals how attackers may be able to poison LLM training datasets. Given the incentives for attackers to poison LLMs so they produce specific desired results, the news that it's easier to achieve than previously thought will require organizations training their own LLMs to add more defenses.

Threat Detection and Incident Response

Oracle patches EBS zero-day exploited in Clop data theft attacks

This story details an instance of attackers exploiting a zero-day in Oracle's EBS server as part of a data theft attack. While it initially appeared that attackers were exploiting an existing vulnerability, it later became clear that they had access to a zero-day to carry out the attacks.

Anatomy of a BEC in 2025

Business email compromise (BEC) attacks are a fact of life in 2025, and one that organizations need to give serious attention to. This post from Invictus gives an in-depth breakdown of a BEC attack that they dealt with. The attack has some interesting details, including the method the attackers used to bypass MFA protection on their accounts.