Research & Threat Intel

December 14, 2022
Back in April 2022, Cado discovered a suspicious ELF binary that utilized DNS over HTTPS, binary padding and in-memory execution...
November 16, 2022
Introduction Researchers at Cado Labs have recently discovered the re-emergence of the threat actor WatchDog. As regular...
October 7, 2022
Organisations – both large and small – are increasingly leveraging Lambda serverless functions. From a business agility...
September 8, 2022
This is the first in a new series of articles from Cado Labs focusing on offensive techniques in the cloud. For this entry,...
June 2, 2022
Summary Introduction Cado Labs regularly analyses attacks targeting services running within our honeypot infrastructure....
May 18, 2022
Introduction Linux has long dominated the server computing landscape, and the rapid adoption of cloud technologies by organisations...
April 6, 2022
By Matt Muir, with thanks to Chris Doman, Al Carchrie and Paul Scott. Organisations – both large and small – are increasingly...
February 2, 2022
Newly Discovered Malware Employs Anti-forensics & Anti-hardening Techniques Introduction Researchers at Cado Security...
January 20, 2022
Introduction Since its discovery at the end of 2021, Log4Shell – a zero-day vulnerability affecting Apache’s Log4j...
January 10, 2022
Overview Abcbot, the emerging botnet that we recently analyzed and reported on, has a longer history than we first thought....