Skip to content
Get a Demo
    curve design on left

    Research & Threat Intel

    blog post featured image
    blog icon Featured Post |

    Darktrace's Proposed Acquisition of Cado Security

    January 22, 2025

    We are excited to share the news that Darktrace has announced its proposed acquisition of Cado Security. This milestone marks a new chapter...

    Continue Reading
    blog icon Cloud Investigations
    Forensic Victory: Catching the Ransomware EDR Couldn't See
    February 13, 2025

    Endpoint Detection & Response (EDR) is frequently used by organizations as the first line of defense against cyber attacks....

    Continue Reading
    blog icon Research & Threat Intel
    Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windows
    December 6, 2024

    Cado Security Labs have identified a new sophisticated scam targeting people who work in Web3. The campaign includes crypto...

    Continue Reading
    blog icon Research & Threat Intel
    The Growing Threat of Docusign Phishing Attacks
    December 4, 2024

    Cado Security Labs have identified a recent DocuSign spearphishing email campaign targeting tech executives. DocuSign email...

    Continue Reading
    blog icon Research & Threat Intel
    GuLoader: Evolving Tactics in Latest Campaign Targeting European Industry
    November 7, 2024

    Cado Security Labs recently discovered a GuLoader campaign targeting European industrial and engineering companies. GuLoader...

    Continue Reading
    blog icon Research & Threat Intel
    Part 2: Investigating Docker Hijacking Malware - A Deep Dive into ELF Binary Analysis
    October 18, 2024

    As the adoption of containerized environments like Docker continues to rise, so does the interest of cybercriminals in...

    Continue Reading
    blog icon Research & Threat Intel
    Part 1: Investigating Docker Hijacking Malware - Analyzing the Docker Host with Packet and Disk Forensics
    October 17, 2024

    Docker's widespread adoption in cloud environments has made it a prime target for attackers seeking to exploit its API or...

    Continue Reading