Cloud Investigations

May 18, 2022

Linux Attack Techniques: Dynamic Linker Hijacking with LD Preload

Introduction Linux has long dominated the server computing landscape, and the rapid adoption of cloud technologies by organisations...
April 14, 2022

Investigating AWS ECS with Cado Response

Cado Response delivers forensic-level detail without forensic-level effort. Through the power of automation, the Cado Response...
April 12, 2022

AWS ECS: Fully Managed but Frustrating to Investigate

Cloudy with a High Chance of Containers Cloud computing is no longer a new idea but we are very much still in a period of...
April 11, 2022

Top 9 Best Practices for AWS ECS Security

AWS ECS is a fully managed container service that allows organizations to easily deploy, manage, and scale containerized...
March 24, 2022

Automating Investigations to Turn your Response Pipeline into a Feedback Loop

One of the core concepts in DevOps (and DevSecOps) is the creation and amplification of feedback loops. By creating, shortening...