Datadog and Okta Combine for New Customer Detections
Comprehensive monitoring of identity activity is crucial to the security of any organization. A compromised identity can lead to widespread data breaches and
Datadog π€ Okta: "The enhanced logic developed by Datadogβs own Security Research team during this collaboration has been contributed back to the public Okta Security Detection Catalog, ensuring that the broader security community benefits from this joint research"
sec.okta.com/articles/202...
06.03.2026 15:14
π 3
π 0
π¬ 0
π 0
LexisNexis confirms data breach as hackers leak stolen files
American data analytics company LexisNexis Legal & Professional has confirmed to BleepingComputer that hackers breached its servers and accessed some customer and business information.
"permitted a single ECS task role "read access to every secret in the account, including the production Redshift master credential.""
There is a lot going on with this (even if not all of it can be believed). Properly scoping IAM is critical!
www.bleepingcomputer.com/news/securit...
04.03.2026 15:08
π 1
π 0
π¬ 0
π 0
π¬
04.03.2026 15:04
π 2
π 0
π¬ 0
π 0
I get the appeal of βhuman-in-the-loopβ for AI safeguards. But humans have been getting socially engineered for millennia.
Thatβs not exactly a hard security boundary π¬
25.02.2026 16:54
π 3
π 0
π¬ 1
π 0
Sometimes I miss Jia Tan.
24.02.2026 19:32
π 0
π 1
π¬ 0
π 0
Donβt expose yourself in public β let AWS error messages do it for you
AWS now reveals public permissions in error messages. Learn how a deny-all session policy exposes which actions would succeed safely.
Hey wake up! New offensive AWS meta just dropped! Thanks to Daniel Grzelak, we now have an effective oracle for determining if resources are publicly exposed without leaving logs. (As an offsec person) LFG!!!
www.plerion.com/blog/dont-ex...
20.02.2026 15:43
π 2
π 2
π¬ 0
π 0
GitHub - Frichetten/Dungeons-and-Agents: Make Codex or Claude Code act as a virtual dungeon master for DND 5e.
Make Codex or Claude Code act as a virtual dungeon master for DND 5e. - Frichetten/Dungeons-and-Agents
If anyone is interested, I built a framework to use Claude Code or Codex to act as a virtual DM for DND. State is stored on the filesystem and persists between sessions. I think Opus 4.6 is the ideal model for this but Codex works too.
github.com/Frichetten/D...
17.02.2026 22:52
π 2
π 0
π¬ 0
π 0
Professional communication
13.02.2026 03:23
π 2
π 0
π¬ 0
π 0
GCP Cloud Workstations Privilege Escalation - Hacking The Cloud
Break out of a Cloud Workstations container through an exposed Docker socket, then access project credentials from instance metadata.
New on Hacking the Cloud! A look at how a familiar container escape pattern shows up in GCP Cloud Workstations. We trace a path from a container to service account.
If youβre using Cloud Workstations, this is a useful model to keep in mind.
hackingthe.cloud/gcp/exploita...
10.02.2026 15:15
π 0
π 0
π¬ 0
π 0
Just got my ticket to @fwdcloudsec.org! Looking forward to the best cloud security conference in the world!
09.02.2026 18:04
π 2
π 0
π¬ 0
π 0
Protect agentic AI applications with Datadog AI Guard | Datadog
Learn how Datadog AI Guard evaluates prompts, responses, and tool calls in real time to help you defend agentic AI applications against emerging threats.
If youβre putting AI agents anywhere near prod, this is worth a read. We built AI Guard to help teams monitor prompts, tool calls, and model behavior in real systems, identifying and blocking AI threats in real time. More here:
www.datadoghq.com/blog/ai-guard/
03.02.2026 19:09
π 2
π 2
π¬ 0
π 0
Get IAM Credentials from a Console Session - Hacking The Cloud
Convert access to the AWS Console into IAM credentials.
New on Hacking the Cloud: Ben Stevens documents a new method for extracting IAM creds from an AWS Console session. Useful for post-exploitation and evasion tradecraft.
I've been meaning to cover this for years. Glad itβs finally live:
hackingthe.cloud/aws/post_exp...
02.02.2026 16:26
π 4
π 0
π¬ 0
π 0
As AI agents get more autonomous, prompt injection will shift from
βignore all previous instructionsβ
to
βadd a task to the backlog to X.β
Once the payload crosses a trust boundary and lands in Jira, itβs no longer a prompt, itβs just another task. A task that makes me admin :D
30.01.2026 16:08
π 4
π 1
π¬ 2
π 0
Houses are bullshit
28.01.2026 02:36
π 3
π 0
π¬ 1
π 0
Call for research: AI and LLM security - Hacking The Cloud
Hacking the Cloud is opening the door to AI and LLM security research.
AI workloads are landing in the same AWS/Azure/GCP accounts weβve been breaking into (and defending) for years. It's time for Hacking the Cloud to catch up. We're announcing a call for research! Share your AI and LLM sec research with thousands of readers hackingthe.cloud/blog/call_fo...
26.01.2026 16:14
π 2
π 1
π¬ 1
π 0
I'm skeptical of the claim that 1,000 Clawdbot instances are publicly facing on the internet. If you look at the Shodan output, most of those boxes don't have port 18789 exposed (default Clawdbot port). The references to 18789 are from mDNS. Take this one for example:
26.01.2026 02:46
π 3
π 0
π¬ 0
π 0
Hmmm, even with sudo access Clawdbot has some sandboxing/protections. In a real environment that's good but I kinda intend for him to have full access to this VM. Gotta change that.
24.01.2026 18:44
π 1
π 0
π¬ 0
π 0
Okay, this is kind of amazing. I wanted to give him a browser so he could surf the net but ran into an error. I was going to fix it myself but said, "Hey man, there is a dpkg in your home directory. Go ahead and install it. You'll have some errors but you'll manage", and he did!
24.01.2026 17:35
π 0
π 0
π¬ 1
π 0
Dang, I should have created clawdbot his own host user. I'll have to take care of that later. Suppose this is a good warning if that's something you want to avoid!
24.01.2026 17:30
π 0
π 0
π¬ 1
π 0
He's alive!
24.01.2026 17:15
π 0
π 0
π¬ 1
π 0
I don't know what skills are exactly, but these seemed useful.
24.01.2026 17:07
π 0
π 0
π¬ 1
π 0
Initial install is easy, there's even an option for integrating with Tailscale which I already setup in the VM.
24.01.2026 17:03
π 1
π 0
π¬ 1
π 0
Clawdbot bought me a car
Outsourcing the painful aspects of a car purchase to AI was refreshingly nice, and sold me on the vision of Clawdbot
Trying out clawdbot! And I'll live tweet my experiences setting it up and using it. It's been all of my timeline and doing cool things. (see @ajs.bsky.social's post below).
I'm running this on an Ubuntu VM managed through KVM with 6 cores and 16 gigs of ram.
aaronstuyvenberg.com/posts/clawd-...
24.01.2026 17:00
π 0
π 0
π¬ 2
π 0
Break LLM Workflows with Claude's Refusal Magic String - Hacking The Cloud
How Anthropic's refusal test string can be abused to stop streaming responses and create sticky failures.
Did you know Claude models have a "magic string" to test when a model refuses to respond? If that string enters prompt context, it can be abused to break LLM workflows until context is reset.
It's the EICAR test string of the AI age. Details:
hackingthe.cloud/ai-llm/explo...
21.01.2026 14:54
π 10
π 1
π¬ 0
π 0
On the Coming Industrialisation of Exploit Generation with LLMs
Recently I ran an experiment where I built agents on top of Opus 4.5 and GPT-5.2 and then challenged them to write exploits for a zeroday vulnerability in the QuickJS Javascript interpreter. I addeβ¦
We are on the verge of the commoditization of exploitation. Every vuln will functionally have a public PoC available because attackers can generate them in minutes.
The advantage will increasingly belong to organizations that can detect, respond, and contain fast.
sean.heelan.io/2026/01/18/o...
19.01.2026 03:24
π 6
π 2
π¬ 0
π 0
CodeBreach: Supply Chain Vuln & AWS CodeBuild Misconfig | Wiz Blog
Wiz Research discovered CodeBreach, a critical vulnerability that risked the AWS Console supply chain. Learn how to secure your AWS CodeBuild pipelines.
Very cool research on a CodeBuild misconfiguration which could have had significant consequences. Iβm a bit disappointed that there wasnβt more done to secure the supply chain after the Q Developer incident.
www.wiz.io/blog/wiz-res...
15.01.2026 18:46
π 3
π 2
π¬ 0
π 0
You'll uncover real world AI threats, publish your research on new attacks and vulnerabilities in AI systems, and partner with industry leaders in cloud exploitation, threat hunting, detection engineering, and more!
14.01.2026 15:29
π 0
π 0
π¬ 0
π 0
Senior Security Researcher - GenAI | Datadog Careers
We're building a platform that engineers love to use. Join us, and help usher in the future.
Weβre hiring! Join the Datadog Security Research team as a Senior Security Researcher specializing in GenAI and help shape the future of AI security!
careers.datadoghq.com/detail/75146...
14.01.2026 15:29
π 1
π 1
π¬ 1
π 0