Please turn on your JavaScript for this page to function normally.
transfer.sh
Attackers increasingly using transfer.sh to host malicious code

For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the latest cryptojacking campaign …

security platform
Cado varc allows security professionals to collect a snapshot of volatile data

Cado Security launches its new open source community tool, Cado varc, allowing security analysts to collect a snapshot of volatile data, adding critical context to incident …

RSA Conference 2022 Early Stage Expo
Photos: RSA Conference 2022 Early Stage Expo

RSA Conference 2022 took place at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. The Early Stage Expo is an …

Security leaders need more data and context to conduct cloud investigations

89% of companies have experienced a negative outcome in the time between detection and investigation of a cyber-attack on their cloud environments, an ESG research reveals. …

Cado Response platform offers enhanced visibility and context across data breaches

Cado Security announced the addition of memory acquisition, processing and analysis capabilities to its Cado Response platform. With Memory Forensics, security teams gain …

Cado Security raises $10M to accelerate adoption of its cloud-native digital forensics platform

Cado Security announced that it closed $10 million in Series A funding, bringing the company’s total capital raised to $11.5 million. Led by Blossom Capital with participation …

Don't miss

Cybersecurity news