<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
  <channel>
    <title>Datadog Security Labs</title>
    <link rel="self">https://securitylabs.datadoghq.com/rss/feed.xml</link>
    <link>https://securitylabs.datadoghq.com</link>
    <description>Datadog Security Labs is the place to read blog content about security research and tooling published by Datadog for the community.</description>
    <pubDate>2026-04-16T00:00:00Z</pubDate>
    <item>
      <title>The case for dependency cooldowns in a post-axios world</title>
      <link>
    https://securitylabs.datadoghq.com/articles/dependency-cooldowns/</link>
      <pubDate>2026-04-16T00:00:00Z</pubDate>
      <description>Understanding npm and the importance of dependency cooldowns.</description>
    </item>
    <item>
      <title>Unpatchable Vulnerabilities of Kubernetes: CVE-2020-8562</title>
      <link>
    https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2020-8562/</link>
      <pubDate>2026-04-09T00:00:00Z</pubDate>
      <description>A look at how Kubernetes CVE-2020-8562 allows attackers to bypass API server proxy protections using DNS rebinding</description>
    </item>
    <item>
      <title>Compromised axios npm package delivers cross-platform RAT</title>
      <link>
    https://securitylabs.datadoghq.com/articles/axios-npm-supply-chain-compromise/</link>
      <pubDate>2026-03-31T00:00:00Z</pubDate>
      <description>An attacker hijacked an axios maintainer&#39;s npm account to publish malicious releases that deliver a cross-platform RAT.</description>
    </item>
    <item>
      <title>Unpatchable Vulnerabilities of Kubernetes: CVE-2020-8561</title>
      <link>
    https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2020-8561/</link>
      <pubDate>2026-03-27T00:00:00Z</pubDate>
      <description>A look at how Kubernetes CVE-2020-8561 works</description>
    </item>
    <item>
      <title>LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign</title>
      <link>
    https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/</link>
      <pubDate>2026-03-24T00:00:00Z</pubDate>
      <description>On March 24 and 27, 2026, malicious PyPI releases of LiteLLM and Telnyx were published as part of the TeamPCP supply chain campaign. We trace the full campaign from Trivy through npm, Checkmarx, and into PyPI.</description>
    </item>
    <item>
      <title>Uncovering agent logging gaps in Copilot Studio</title>
      <link>
    https://securitylabs.datadoghq.com/articles/copilot-studio-logging-gaps/</link>
      <pubDate>2026-03-10T00:00:00Z</pubDate>
      <description>During research, we sometimes encounter scenarios that remind us that it&#39;s a good idea to trust but verify. In September 2025, we noticed that certain Microsoft Copilot Studio agent settings did not log certain administrative actions related to sharing, authentication, logging, and publication of Copilot Studio agents.</description>
    </item>
    <item>
      <title>Behind the console: Active phishing campaign targeting AWS console credentials</title>
      <link>
    https://securitylabs.datadoghq.com/articles/behind-the-console-aws-aitm-phishing-campaign/</link>
      <pubDate>2026-03-09T00:00:00Z</pubDate>
      <description>Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS Console credentials via typosquatted domains that mimic AWS infrastructure.</description>
    </item>
    <item>
      <title>Hook, line, and vault: A technical deep dive into the 1Phish kit</title>
      <link>
    https://securitylabs.datadoghq.com/articles/hook-line-vault-a-deep-dive-into-1phish/</link>
      <pubDate>2026-02-27T00:00:00Z</pubDate>
      <description>We analyze the evolution of the 1Phish phishing kit from a basic credential harvester into an MFA-aware, multi-stage phishing kit targeting 1Password users.</description>
    </item>
    <item>
      <title>Kubernetes project issues warning on Ingress NGINX retirement</title>
      <link>
    https://securitylabs.datadoghq.com/articles/kubernetes-ingress-nginx-retirement-warning/</link>
      <pubDate>2026-02-19T00:00:00Z</pubDate>
      <description>The Kubernetes project is urging organizations to migrate away from Ingress NGINX before its retirement in March 2026, with new high-severity CVEs underscoring the urgency.</description>
    </item>
    <item>
      <title>Tech impersonators: ClickFix and MacOS infostealers</title>
      <link>
    https://securitylabs.datadoghq.com/articles/tech-impersonators-clickfix-and-macos-infostealers/</link>
      <pubDate>2026-02-10T00:00:00Z</pubDate>
      <description>Datadog identified an active campaign employing fake GitHub repositories impersonating software companies and leveraging the ClickFix initial access technique to deliver macOS infostealers.</description>
    </item>
    <item>
      <title>Web Traffic Hijacking: When Your Nginx Configuration Turns Malicious</title>
      <link>
    https://securitylabs.datadoghq.com/articles/web-traffic-hijacking-nginx-configuration-malicious/</link>
      <pubDate>2026-02-04T00:00:00Z</pubDate>
      <description>Datadog Security Research has identified an active web traffic hijacking campaign that targets NGINX installations and management panels like Baota (BT). In this post, we provide our analysis of the techniques this campaign uses and share indicators of compromise you can check for in your NGINX configurations.</description>
    </item>
    <item>
      <title>OpenSSL January 2026 Security Update: CMS and PKCS#12 Buffer Overflows</title>
      <link>
    https://securitylabs.datadoghq.com/articles/openssl-january-2026-security-update-cms-and-pkcs12-buffer-overflows/</link>
      <pubDate>2026-01-27T00:00:00Z</pubDate>
      <description>A deep dive into OpenSSL’s January 2026 CMS and PKCS#12 vulnerabilities, including a pre-auth stack overflow and a PKCS#12 parsing bug.</description>
    </item>
    <item>
      <title>Introducing IDE-SHEPHERD: Your shield against threat actors lurking in your IDE</title>
      <link>
    https://securitylabs.datadoghq.com/articles/ide-shepherd-release-article/</link>
      <pubDate>2026-01-26T00:00:00Z</pubDate>
      <description>IDE-SHEPHERD is an open-source IDE security extension that provides real-time monitoring and protection for VS Code and Cursor. It intercepts malicious process executions, monitors network activity, and blocks dangerous workspace tasks before they can compromise your development environment.</description>
    </item>
    <item>
      <title>Unpatchable Vulnerabilities of Kubernetes: CVE-2020-8554</title>
      <link>
    https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2020-8554/</link>
      <pubDate>2026-01-14T00:00:00Z</pubDate>
      <description>A look at how Kubernetes CVE-2020-8554 works</description>
    </item>
    <item>
      <title>Decoding the GitHub recommendations for npm maintainers</title>
      <link>
    https://securitylabs.datadoghq.com/articles/decoding-the-recommendations-for-npm-maintainers/</link>
      <pubDate>2026-01-07T00:00:00Z</pubDate>
      <description>This blog post explores the rationale and implementation behind GitHub&#39;s security recommendations for npm maintainers following numerous high-profile supply-chain incidents. It details how hardening publishing infrastructure through trusted publishing, enforced two-factor authentication, and WebAuthn-based protocols can meaningfully increase the resilience of the ecosystem.</description>
    </item>
    <item>
      <title>Introducing Pathfinding.cloud</title>
      <link>
    https://securitylabs.datadoghq.com/articles/introducing-pathfinding.cloud/</link>
      <pubDate>2025-12-17T00:00:00Z</pubDate>
      <description>Introducing Pathfinding.cloud, a library of AWS IAM privilege escalation paths</description>
    </item>
    <item>
      <title>Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users</title>
      <link>
    https://securitylabs.datadoghq.com/articles/investigating-an-aitm-phishing-campaign-m365-okta/</link>
      <pubDate>2025-12-10T00:00:00Z</pubDate>
      <description>In this post, we investigate a recent phishing campaign that targets Microsoft 365 users.</description>
    </item>
    <item>
      <title>CVE-2025-55182 (React2Shell): Remote code execution in React Server Components and Next.js</title>
      <link>
    https://securitylabs.datadoghq.com/articles/cve-2025-55182-react2shell-remote-code-execution-react-server-components/</link>
      <pubDate>2025-12-04T00:00:00Z</pubDate>
      <description>Learn more about the CVE-2025-55182 vulnerability affecting React Server Components and affecting Next.js.</description>
    </item>
    <item>
      <title>The Shai-Hulud 2.0 npm worm: analysis, and what you need to know</title>
      <link>
    https://securitylabs.datadoghq.com/articles/shai-hulud-2.0-npm-worm/</link>
      <pubDate>2025-11-25T00:00:00Z</pubDate>
      <description>Learn more about the Shai-Hulud 2.0 npm worm.</description>
    </item>
    <item>
      <title>Why Datadog is a 2025 Cloud Security Leader</title>
      <link>
    https://securitylabs.datadoghq.com/articles/why-datadog-is-a-cloud-security-leader/</link>
      <pubDate>2025-11-20T00:00:00Z</pubDate>
      <description>A recap of Datadog&#39;s awards from the 2025 Latio Cloud Security Market Report</description>
    </item>
    <item>
      <title>A 2025 look at real-world Kubernetes version adoption</title>
      <link>
    https://securitylabs.datadoghq.com/articles/a-2025-look-at-real-world-kubernetes-adoption/</link>
      <pubDate>2025-11-10T00:00:00Z</pubDate>
      <description>A 2025 look at real-world Kubernetes version adoption</description>
    </item>
    <item>
      <title>MUT-4831: Trojanized npm packages deliver Vidar infostealer malware</title>
      <link>
    https://securitylabs.datadoghq.com/articles/mut-4831-trojanized-npm-packages-vidar/</link>
      <pubDate>2025-11-06T00:00:00Z</pubDate>
      <description>Analysis of a threat actor campaign targeting Windows users with Vidar infostealer malware via malicious npm packages</description>
    </item>
    <item>
      <title>A runtime security approach to detecting supply chain attacks</title>
      <link>
    https://securitylabs.datadoghq.com/articles/supply-chain-attacks-runtime-security-detection/</link>
      <pubDate>2025-11-05T00:00:00Z</pubDate>
      <description>Detecting software supply chain attacks through runtime security.</description>
    </item>
    <item>
      <title>Datadog threat roundup: Top insights for Q3 2025</title>
      <link>
    https://securitylabs.datadoghq.com/articles/2025-q3-threat-roundup/</link>
      <pubDate>2025-10-31T00:00:00Z</pubDate>
      <description>Threat insights from Datadog Security Labs for Q3 2025.</description>
    </item>
    <item>
      <title>Learnings from recent npm supply chain compromises</title>
      <link>
    https://securitylabs.datadoghq.com/articles/learnings-from-recent-npm-compromises/</link>
      <pubDate>2025-10-30T00:00:00Z</pubDate>
      <description>A look at recent npm supply chain compromises and how we can learn from them to better prepare for future incidents.</description>
    </item>
    <item>
      <title>CoPhish: Using Microsoft Copilot Studio as a wrapper for OAuth phishing</title>
      <link>
    https://securitylabs.datadoghq.com/articles/cophish-using-microsoft-copilot-studio-as-a-wrapper/</link>
      <pubDate>2025-10-20T00:00:00Z</pubDate>
      <description>Copilot Studio links look benign, but they can host content to redirect users to arbitrary URLs. In this post, we document a method by which a Copilot Studio agent&#39;s login settings can redirect a user to any URL, including an OAuth consent attack.</description>
    </item>
    <item>
      <title>CVE-2025-52882: WebSocket authentication bypass in Claude Code extensions</title>
      <link>
    https://securitylabs.datadoghq.com/articles/claude-mcp-cve-2025-52882/</link>
      <pubDate>2025-08-26T00:00:00Z</pubDate>
      <description>A critical vulnerability in older versions of the Claude Code for Visual Studio Code (VS Code) and other IDE extensions allowed malicious websites to connect to unauthenticated local WebSocket servers, potentially enabling remote command execution</description>
    </item>
    <item>
      <title>MCP vulnerability case study: SQL injection in the Postgres MCP server</title>
      <link>
    https://securitylabs.datadoghq.com/articles/mcp-vulnerability-case-study-SQL-injection-in-the-postgresql-mcp-server/</link>
      <pubDate>2025-08-21T00:00:00Z</pubDate>
      <description>Learn how vulnerability in Anthropic&#39;s reference Postgres MCP server allowed us to bypass the read-only restriction and execute arbitrary SQL statements.</description>
    </item>
    <item>
      <title>Enumerating AWS the quiet way: CloudTrail-free discovery with Resource Explorer</title>
      <link>
    https://securitylabs.datadoghq.com/articles/enumerating-aws-the-quiet-way-cloudtrail-free-discovery-with-resource-explorer/</link>
      <pubDate>2025-08-19T00:00:00Z</pubDate>
      <description>Discover how attackers could quietly enumerate AWS resources via Resource Explorer, and how Datadog and AWS worked together to close the visibility gap.</description>
    </item>
    <item>
      <title>Datadog threat roundup: Top insights for Q2 2025</title>
      <link>
    https://securitylabs.datadoghq.com/articles/2025-q2-threat-roundup/</link>
      <pubDate>2025-08-14T00:00:00Z</pubDate>
      <description>Threat insights from Datadog Security Labs for Q2 2025.</description>
    </item>
  </channel>
</rss>
