The Cado Blog

Read timely commentary on the latest in cloud incident response from the Cado Security team.

May 30, 2023
What is a Data Breach? A data breach occurs when unauthorized individuals or entities gain access to confidential or sensitive...
May 25, 2023
In June 2022, we accomplished a major breakthrough by integrating container level support for AKS and EKS into the Cado platform...
May 24, 2023
Cado Labs recently discovered and reported on an emerging cloud-focused hacktool, designed to harvest credentials from misconfigured...
May 23, 2023
Is Cloud Forensics just Log Analysis? The cloud sure does have a lot of logs. There are IAM logs, application logs, infrastructure...
May 11, 2023
At first glance, your XDR seems like an ideal tool to investigate an incident. But an XDR alone can leave you with some serious...
May 8, 2023
Data breaches have become an unfortunate reality of today’s digital landscape. As industries become more regulated,...
May 4, 2023
KAPE (Kroll Artifact Parser And Extractor) and Cado Community Edition are both great free tools for DFIR professionals. You...
April 17, 2023
Previously we released a SIEM export feature which enabled security professionals to export a subset of events collected...
April 13, 2023
Cado Labs researchers recently encountered an emerging Python-based credential harvester and hacktool, named Legion, aimed...