2025 cloud security roundup: How attackers abused identities, supply chains, and AI
Datadog | The Monitor blog

2025 cloud security roundup: How attackers abused identities, supply chains, and AI


Summary

The Datadog team discovered a malicious actor attempting to contribute harmful code to their open-source repositories via a seemingly legitimate pull request. They detail how the attacker tried to inject code that would steal credentials from users of their agents, but were caught by a combination of automated checks, vigilant community members, and careful code review. This incident highlights the growing need for robust security practices in open-source projects to defend against increasingly sophisticated AI-assisted attacks.
Read the Original Article

This article originally appeared on Datadog | The Monitor blog.

Read Full Article on Original Site

Popular from Datadog | The Monitor blog

1
Understand session replays faster with AI summaries and smart chapters
Understand session replays faster with AI summaries and smart chapters

Datadog | The Monitor blog Apr 2, 2026 33 views

2
Datadog achieves ISO 42001 certification for responsible AI
Datadog achieves ISO 42001 certification for responsible AI

Datadog | The Monitor blog Mar 26, 2026 29 views

3
Analyzing round trip query latency
Analyzing round trip query latency

Datadog | The Monitor blog Mar 27, 2026 27 views

4
Introducing Bits AI Dev Agent for Code Security
Introducing Bits AI Dev Agent for Code Security

Datadog | The Monitor blog Mar 26, 2026 24 views

5
Introducing our open source AI-native SAST
Introducing our open source AI-native SAST

Datadog | The Monitor blog Apr 10, 2026 23 views