Supply Chain Security Vulnerability2 Min Read November 4, 2025 Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks Details have emerged about a now-patched critical security flaw in the popular "@react-native-community/cli" npm package that could be potentially exploit…
2 Min Read November 4, 2025 Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed Cybersecurity researchers have disclosed details of four security flaws… Apple Exploits Vulnerabilities Windows
8 Min Read November 4, 2025 Ransomware Defense Using the Wazuh Open Source Platform Ransomware is malicious software designed to block access to a computer… Cybercrime Threat Detection
2 Min Read November 3, 2025 Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks Bad actors are increasingly training their sights on trucking and… Cybercrime Supply Chain Attack
Attack Surface Threat Intelligence5 Min Read August 25, 2025 Have You Turned Off Your Virtual Oven? You check that the windows are shut before leaving home. Return to the kitchen to verify that the oven and stove were definitely turned off.…
Linux Threat Intelligence2 Min Read August 25, 2025 Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS Japan’s CERT coordination center (JPCERT/CC) on Thursday revealed it observed incidents that involved the use of a command-and-control…
Server Security Vulnerability3 Min Read August 25, 2025 New HTTP/2 'MadeYouReset' Vulnerability Enables Large-Scale DoS Attacks Multiple HTTP/2 implementations have been found susceptible to a new attack technique called MadeYouReset that could be explored to conduct…
Network Security Vulnerability2 Min Read August 25, 2025 Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution Cisco has released security updates to address a maximum-severity security flaw in Secure Firewall Management Center (FMC) Software that could…
Artificial Intelligence Zero Trust3 Min Read August 25, 2025 Zero Trust + AI: Privacy in the Age of Agentic AI We used to think of privacy as a perimeter problem: about walls and locks, permissions, and policies. But in a world where artificial agents…
Cryptocurrency Financial Crime5 Min Read August 25, 2025 U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Thursday renewed sanctions against Russian…
Malware Open Source3 Min Read August 25, 2025 Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools A Chinese-speaking advanced persistent threat (APT) actor has been observed targeting web infrastructure entities in Taiwan using customized…
Malware Vulnerability3 Min Read August 25, 2025 Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware The threat actor known as EncryptHub is continuing to exploit a now-patched security flaw impacting Microsoft Windows to deliver malicious…
Android Malware2 Min Read August 25, 2025 ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC 3.0, uncovering serious shortcomings in…
Data Breach Regulatory Compliance4 Min Read August 25, 2025 Wazuh for Regulatory Compliance Organizations handling various forms of sensitive data or personally identifiable information (PII) require adherence to regulatory compliance…
Malware3 Min Read August 25, 2025 “PromptFix” Attacks Could Supercharge Agentic AI Threats Researchers have engineered a new version of the ClickFix social engineering technique using prompt injection to trick agentic AI into…
Data Breach3 Min Read August 25, 2025 Orange Data Breach Raises SIM-Swapping Attack Fears A threat actor has compromised 850,000 Orange Belgium customer accounts, with SIM card numbers and Personal Unblocking Key (PUK) codes among…
Cloud Security Malware2 Min Read August 25, 2025 Oregon Man Charged in Rapper Bot DDoS-for-Hire Case A 22-year-old Oregon man has been charged with administering the Rapper Bot DDoS-for-hire botnet, which was allegedly used to launch…
Data Breach2 Min Read August 25, 2025 Colt Admits Customer Data Likely Stolen in Cyber-Attack Colt Technology Services has confirmed that cybercriminals could leak customer data. This is despite previously claiming the recent cyber…
Apple Malware3 Min Read August 25, 2025 Russian Espionage Group Static Tundra Targets Legacy Cisco Flaw A seven-year-old vulnerability affecting end-of-life Cisco network devices is being exploited by a Russian state-sponsored cyber espionage…
Cloud Security3 Min Read August 25, 2025 Microsoft to Make All Products Quantum Safe by 2033 Microsoft has announced plans to implement quantum-safe solutions in its products and services from 2029, with the tech giant aiming for a…
Apple Malware2 Min Read August 25, 2025 Apple Releases Patch for Likely Exploited Zero-Day Vulnerability In a series of updates for its iOS, iPadOS, and macOS operating systems, Apple released a patch for a previously unknown vulnerability that…
Security1 Min Read August 25, 2025 FBI warns of Russian hackers exploiting 7-year-old Cisco flaw The Federal Bureau of Investigation (FBI) has warned that hackers linked to Russia’s Federal Security Service (FSB) are targeting…
Security1 Min Read August 25, 2025 Why Certified VMware Pros Are Driving the Future of IT By Brenda Emerson, VMUG President IT isn’t getting any simpler. For many, the cloud’s gone hybrid, AI’s moved in…
Microsoft2 Min Read August 25, 2025 Microsoft asks customers for feedback on reported SSD failures Microsoft is seeking further information from customers who reported failure and data corruption issues affecting their solid-state…
Security3 Min Read August 25, 2025 Europol confirms $50,000 Qilin ransomware reward is fake Europol has confirmed that a Telegram channel impersonating the agency and offering a $50,000 reward for information on two Qilin ransomware…
Security2 Min Read August 25, 2025 Colt confirms customer data stolen as Warlock ransomware auctions files UK-based telecommunications company Colt Technology Services confirms that customer documentation was stolen as Warlock ransomware gang…
Legal Security2 Min Read August 25, 2025 Dev gets 4 years for creating kill switch on ex-employer's systems A software developer has been sentenced to four years in prison for sabotaging his ex-employer’s Windows network with custom malware and…
Healthcare Security3 Min Read August 25, 2025 DaVita says ransomware gang stole data of nearly 2.7 million people Kidney dialysis firm DaVita has confirmed that a ransomware gang that breached its network stole the personal and health information of nearly…
Security2 Min Read August 25, 2025 Massive anti-cybercrime operation leads to over 1,200 arrests in Africa Law enforcement authorities in Africa have arrested over 1,200 suspects as part of ‘Operation Serengeti 2.0,’ an INTERPOL-led…
Exploits Web Security7 Min Read August 21, 2025 MCP vulnerability case study: SQL injection in the Postgres MCP server Key points and observations We found a SQL injection vulnerability in Anthropic’s reference Postgres MCP server that allowed us to…
Cloud Security7 Min Read August 19, 2025 Enumerating AWS the quiet way: CloudTrail-free discovery with Resource Explorer As security researchers, we strive to ideate, identify, and document new methods of attacking cloud services and resources. We build…
Cloud Security Malware Ransomware Windows6 Min Read August 14, 2025 Datadog threat roundup: Top insights for Q2 2025 As a leading provider in observability and cloud security, Datadog has unique insight into threat actor behavior that targets cloud…
IoT Research Whitepapers4 Min Read July 30, 2025 Vulnerabilities Identified in Dahua Hero C1 Smart Cameras Whitepapers IoT Research min read Vulnerabilities Identified in Dahua Hero C1 Smart Cameras Bitdefender July 30, 2025 Promo Protect all your…
Cloud Security Network Phishing Ransomware4 Min Read July 30, 2025 Backdoors & Breaches gameplay guide At DASH 2025, we released a Datadog expansion pack of Backdoors & Breaches, a popular incident response card game by Black Hills…
Cloud Security Phishing Supply Chain3 Min Read July 28, 2025 Datadog guide to Hacker Summer Camp 2025 Every year in early August, conferences in Las Vegas, Nevada, serve as a gathering of security professionals in a single place. This time of…
Cloud Security Malware Ransomware Vulnerabilities10 Min Read July 21, 2025 Beyond Mimo’lette: Tracking Mimo's Expansion to Magento CMS and Docker Executive summary Through investigations into a string of workload compromises involving ecommerce sites, the Datadog Security Research team…
Cloud Security Malware Ransomware Vulnerabilities24 Min Read July 16, 2025 I SPy: Escalating to Entra ID's Global Admin with a first-party app This research was presented at fwd:cloudsec North America on June 30th, 2025. You can find the talk here. Key points Service principals (SPs)…
Cloud Security5 Min Read July 14, 2025 Kubernetes security fundamentals: PKI In the previous post in this series, we looked at how Kubernetes network security is implemented. For this post, we’ll explore a topic…
Apple Linux Vulnerabilities Windows4 Min Read July 10, 2025 CVE-2025-48384: Git vulnerable to arbitrary file write on non-Windows systems Update - July 11, 2025: We are making a correction to the Git CLI versions vulnerable to this based on updates to the GitHub advisory around…
Malware Network Ransomware Windows12 Min Read May 21, 2025 The obfuscation game: MUT-9332 targets Solidity developers via malicious VS Code extensions Key points and observations Datadog Security Research discovered three malicious VS Code extensions that target Solidity developers on…
Cloud Security Data Breach Vulnerabilities5 Min Read May 13, 2025 Tales from the cloud trenches: The Attacker doth persist too much, methinks As a result of a recent threat hunt, we observed attacker activity originating from a leaked long-term AWS access key (AKIA*). Within a…
Anti-Malware Research6 Min Read May 8, 2025 Weaponizing Facebook Ads: Inside the Multi-Stage Malware Campaign Exploiting Cryptocurrency Brands A persistent malvertising campaign is plaguing Facebook, leveraging the reputations of well-known cryptocurrency exchanges to lure victims…
Exploits Linux Malware Ransomware8 Min Read May 7, 2025 RedisRaider: Weaponizing misconfigured Redis to mine cryptocurrency at scale Key points and observations Datadog Security Research has discovered a new Linux cryptojacking campaign, named RedisRaider, targeting publicly…
Scam Research5 Min Read April 30, 2025 Active Subscription Scam Campaigns Flooding the Internet Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign…
Cloud Security Malware Phishing Ransomware11 Min Read April 17, 2025 Datadog threat roundup: Top insights for Q1 2025 As a leading provider in observability and cloud security, Datadog has unique insight into threat actor behavior that targets cloud…
Anti-Malware Research7 Min Read March 18, 2025 Hundreds of Malicious Google Play-Hosted Apps Bypassed Android 13 Security With Ease Bitdefender's security researchers have identified a large-scale ad fraud campaign that deployed hundreds of malicious apps in the Google Play…