Cado Security launches Cloud Incident Readiness Dashboard for proactive response

Cado Security has unveiled Cado’s Incident Readiness Dashboard. This new dashboard provides the ability to proactively run readiness checks, see readiness trends over time, and identify issues that could prevent the organization from rapidly responding… Continue reading Cado Security launches Cloud Incident Readiness Dashboard for proactive response

Jupyter Notebooks targeted by cryptojackers

Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. What are Jupyter Notebooks? “Jupyter is a service that allows you to host individual … Continue reading Jupyter Notebooks targeted by cryptojackers

US companies commit to safe, transparent AI development

Seven US artificial intelligence (AI) giants – Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI – have publicly committed to “help move toward safe, secure, and transparent development of AI technology.” The co… Continue reading US companies commit to safe, transparent AI development

Legion AWS credential harvester and hijacker analyzed

Researchers from Cado Labs recently encountered an update to the emerging cloud-focused malware family, Legion. This sample iterates upon the credential harvesting features of its predecessor, with a continued emphasis on exploiting PHP web application… Continue reading Legion AWS credential harvester and hijacker analyzed

Attackers increasingly using transfer.sh to host malicious code

For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the latest cryptojacking campaign spotted by Cado Labs researcher cannot be considered news. But one its elements po… Continue reading Attackers increasingly using transfer.sh to host malicious code

Cado varc allows security professionals to collect a snapshot of volatile data

Cado Security launches its new open source community tool, Cado varc, allowing security analysts to collect a snapshot of volatile data, adding critical context to incident investigations. By enabling security professionals to drastically simplify the … Continue reading Cado varc allows security professionals to collect a snapshot of volatile data

Photos: RSA Conference 2022 Early Stage Expo

RSA Conference 2022 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. The Early Stage Expo is an innovation space dedicated to promoting up-and-comers in the industry. The fe… Continue reading Photos: RSA Conference 2022 Early Stage Expo

Security leaders need more data and context to conduct cloud investigations

89% of companies have experienced a negative outcome in the time between detection and investigation of a cyber-attack on their cloud environments, an ESG research reveals. The research further revealed that it takes an average of 3.1 days to begin an … Continue reading Security leaders need more data and context to conduct cloud investigations

Cado Response platform offers enhanced visibility and context across data breaches

Cado Security announced the addition of memory acquisition, processing and analysis capabilities to its Cado Response platform. With Memory Forensics, security teams gain enhanced visibility and context to identify the root cause of incidents and respo… Continue reading Cado Response platform offers enhanced visibility and context across data breaches