The Cado Blog

Read timely commentary on the latest in cloud incident response from the Cado Security team.

January 25, 2023
Cado Labs researchers have discovered evidence of retaliation from Russian cyber threat groups, in response to yesterday’s...
January 24, 2023
If we consider the main reasons why organizations moved to cloud in the first place, it’s because of the speed, agility...
January 19, 2023
This is the second of a three-part blog series written by Cado and Invictus Incident Response, where we are investigating...
January 13, 2023
A match made in heaven, cloud computing and DevOps provide the scalability, accessibility, and automation required to implement...
January 3, 2023
As we move into 2023, it’s important to stay ahead of the curve when it comes to cloud security. The cloud has become...
December 27, 2022
Cyber security teams don’t always want to wait for an alert to know about malicious activity. By performing threat hunting...
December 21, 2022
Introduction Researchers at Crowdstrike recently discovered a novel cryptojacking campaign, targeting Docker and Kubernetes,...
December 15, 2022
Introduction OpenAI has recently unveiled its newest addition to the GPT-3 family of natural language models: ChatGPT (and...
December 14, 2022
Back in April 2022, Cado discovered a suspicious ELF binary that utilized DNS over HTTPS, binary padding and in-memory execution...