Skip to content
Get a Demo
    curve design on left

    Research & Threat Intel

    blog post featured image
    blog icon Featured Post | Product Updates

    What's New in the Cado Platform Q1 2024 Recap

    April 23, 2024

    Over the past quarter, the Cado team has been hard at work bringing new features and enhancements to the Cado platform. Here's an overview...

    Continue Reading
    blog icon Research & Threat Intel
    Part 2: Investigating Docker Hijacking Malware - A Deep Dive into ELF Binary Analysis
    October 18, 2024

    As the adoption of containerized environments like Docker continues to rise, so does the interest of cybercriminals in...

    Continue Reading
    blog icon Research & Threat Intel
    Part 1: Investigating Docker Hijacking Malware - Analyzing the Docker Host with Packet and Disk Forensics
    October 17, 2024

    Docker's widespread adoption in cloud environments has made it a prime target for attackers seeking to exploit its API or...

    Continue Reading
    blog icon Research & Threat Intel
    The Impact of Cybersecurity Breaches on Healthcare Organizations
    October 15, 2024

    The healthcare industry has become a prime target for cyberattacks, with breaches in healthcare systems occurring in...

    Continue Reading
    blog icon Research & Threat Intel
    From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking
    September 12, 2024

    Cado Security have identified two campaigns targeting the popular web testing tool Selenium Grid. The campaign includes...

    Continue Reading
    blog icon Research & Threat Intel
    From the Depths: Analyzing the Cthulhu Stealer Malware for macOS
    August 22, 2024

    For years there has been a general belief in the Zeitgeist that macOS systems are immune to malware. While MacOS has a...

    Continue Reading
    blog icon Research & Threat Intel
    Vigilance in Action: Monitoring Typosquatting Domains
    August 21, 2024

    Introduction In today's digital landscape, cybercriminals are constantly devising new and innovative ways to infiltrate and...

    Continue Reading