Skip to content
Get a Demo
    curve design on left

    Research & Threat Intel

    blog post featured image
    blog icon Featured Post | Product Updates

    What's New in the Cado Platform Q1 2024 Recap

    April 23, 2024

    Over the past quarter, the Cado team has been hard at work bringing new features and enhancements to the Cado platform. Here's an overview...

    Continue Reading
    blog icon Research & Threat Intel
    Spinning YARN - A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence
    March 6, 2024

    Introduction Cado Security Labs researchers have recently encountered an emerging malware campaign targeting misconfigured...

    Continue Reading
    blog icon Free Resources
    Migo - a Redis Miner with Novel System Weakening Techniques
    February 20, 2024

    Introduction Cado Security Labs researchers have recently encountered a novel malware campaign targeting Redis for initial...

    Continue Reading
    blog icon Research & Threat Intel
    Containerised Clicks: Malicious use of 9hits on vulnerable docker hosts
    January 18, 2024

    By Nate Bill Introduction During routine monitoring of our honeypot infrastructure, Cado Security Labs researchers observed...

    Continue Reading
    blog icon Research & Threat Intel
    Cloudypots: Our Latest Method for Uncovering Novel Attack Techniques
    December 7, 2023

    Cado Security Labs operates several honeypots for various services, enabling us to discover novel malware and threat vectors...

    Continue Reading
    blog icon Research & Threat Intel
    P2Pinfect - New Variant Targets MIPS Devices
    December 4, 2023

    Summary A new P2Pinfect variant compiled for the Microprocessor without Interlocked Pipelined Stages (MIPS) architecture has...

    Continue Reading
    blog icon Research & Threat Intel
    Qubitstrike - An Emerging Malware Campaign Targeting Jupyter Notebooks
    October 18, 2023

    Qubitstrike Discord C2 operation Summary First reported case of Codeberg code hosting platform used to distribute malware...

    Continue Reading