Skip to content
Get a Demo
    curve design on left

    Research & Threat Intel

    blog post featured image
    blog icon Featured Post |

    What’s New In The Cado Platform Q3 2024

    November 19, 2024

    As we continue to enhance and expand the capabilities of the Cado platform, Q3 2024 brings a host of updates designed to improve the...

    Continue Reading
    blog icon Research & Threat Intel
    GuLoader: Evolving Tactics in Latest Campaign Targeting European Industry
    November 7, 2024

    Cado Security Labs recently discovered a GuLoader campaign targeting European industrial and engineering companies. GuLoader...

    Continue Reading
    blog icon Research & Threat Intel
    Part 2: Investigating Docker Hijacking Malware - A Deep Dive into ELF Binary Analysis
    October 18, 2024

    As the adoption of containerized environments like Docker continues to rise, so does the interest of cybercriminals in...

    Continue Reading
    blog icon Research & Threat Intel
    Part 1: Investigating Docker Hijacking Malware - Analyzing the Docker Host with Packet and Disk Forensics
    October 17, 2024

    Docker's widespread adoption in cloud environments has made it a prime target for attackers seeking to exploit its API or...

    Continue Reading
    blog icon Research & Threat Intel
    The Impact of Cybersecurity Breaches on Healthcare Organizations
    October 15, 2024

    The healthcare industry has become a prime target for cyberattacks, with breaches in healthcare systems occurring in...

    Continue Reading
    blog icon Research & Threat Intel
    From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking
    September 12, 2024

    Cado Security have identified two campaigns targeting the popular web testing tool Selenium Grid. The campaign includes...

    Continue Reading
    blog icon Research & Threat Intel
    From the Depths: Analyzing the Cthulhu Stealer Malware for macOS
    August 22, 2024

    For years there has been a general belief in the Zeitgeist that macOS systems are immune to malware. While MacOS has a...

    Continue Reading