Cado Security teams up with Wiz to accelerate forensic investigations and minimize cloud threats

Cado Security has uveiled its partnership with Wiz and joins Wiz Integration (WIN) Platform. Cado Security enhances WIN by bringing the power of the Cado Security platform to the partner ecosystem so that Wiz customers can seamlessly integrate Cado int… Continue reading Cado Security teams up with Wiz to accelerate forensic investigations and minimize cloud threats

Infosec products of the month: March 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, AuditBoard, Bedrock Security, Cado Security, Check Point, CyberArk, Cynerio, DataDome, Delinea, Drata, Exabeam, GitGuardian, GitHub, GlobalSign, Legat… Continue reading Infosec products of the month: March 2024

Cado Security enables organizations to investigate and respond to potential M365 threats

Cado Security announced that the Cado platform now enables customers to acquire Microsoft 365 Unified Audit Log (UAL) to help investigate and respond to Microsoft 365 compromises such as business email compromise (BEC), account takeover (ATO), and insi… Continue reading Cado Security enables organizations to investigate and respond to potential M365 threats

CloudGrappler: Open-source tool detects activity in cloud environments

CloudGrappler is an open-source tool designed to assist security teams in identifying threat actors within their AWS and Azure environments. The tool, built on the foundation of Cado Security’s cloudgrep project, offers enhanced detection capabilities … Continue reading CloudGrappler: Open-source tool detects activity in cloud environments

Cryptojacking is no longer the sole focus of cloud attackers

As commercial adoption of cloud technologies continues, cloud-focused malware campaigns have increased in sophistication and number – a collective effort to safeguard both large and small enterprises is critical, according to Cado Security. Docker rema… Continue reading Cryptojacking is no longer the sole focus of cloud attackers

Cloud security predictions for 2024

As we reflect on the cybersecurity landscape and the trajectories of threat vectors, it’s evident that we’re on the cusp of a paradigm shift in cloud security. Businesses and cybersecurity professionals must stay abreast of these changes, a… Continue reading Cloud security predictions for 2024

Cado Security launches Cloud Incident Readiness Dashboard for proactive response

Cado Security has unveiled Cado’s Incident Readiness Dashboard. This new dashboard provides the ability to proactively run readiness checks, see readiness trends over time, and identify issues that could prevent the organization from rapidly responding… Continue reading Cado Security launches Cloud Incident Readiness Dashboard for proactive response

Jupyter Notebooks targeted by cryptojackers

Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. What are Jupyter Notebooks? “Jupyter is a service that allows you to host individual … Continue reading Jupyter Notebooks targeted by cryptojackers

US companies commit to safe, transparent AI development

Seven US artificial intelligence (AI) giants – Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI – have publicly committed to “help move toward safe, secure, and transparent development of AI technology.” The co… Continue reading US companies commit to safe, transparent AI development

Legion AWS credential harvester and hijacker analyzed

Researchers from Cado Labs recently encountered an update to the emerging cloud-focused malware family, Legion. This sample iterates upon the credential harvesting features of its predecessor, with a continued emphasis on exploiting PHP web application… Continue reading Legion AWS credential harvester and hijacker analyzed