Cloud-native forensics technology provider Cado Security announced that it is raising $10 million for a planned expansion through a funding round headed by Blossom Capital, TechCrunch reports. The funding campaign reflects the growing demand for advanced forensics services as part of an enterprise’s cloud security protocol, as evidenced by the recent SolarWinds attack, which demonstrated that the ability to perform advanced investigations to determine the specifics of a breach, whether it is still active and whether attackers can still exploit the vulnerability, is just as important as data loss detection and attack prevention. Response – Cado’s offering – is designed to be compatible with on-premises, cloud and hybrid environments and is available for deployment on AWS EC2 as well as Kubernetes, Docker, AWS Fargate and OpenShift container systems, with plans to expand to Azure, according to the company, though Google Cloud is currently a low-priority target, according to CEO James Campbell. Response addresses the typical post-breach problem of slow investigation times by employing big data tools that enable fast, automated analysis of activity logs to detect unusual activity and discover patterns – a method for which the company has filed patents.
Jill Aitoro leads editorial for SC Media, and content strategy for parent company CyberRisk Alliance. She 20 years of experience editing and reporting on technology, business and policy.
Washington, D.C.'s Department of Insurance, Securities and Banking has disclosed that 800GB of data claimed to have been stolen by the LockBit ransomware operation was obtained from an attack against third-party software provider Tyler Technologies following the ransomware gang's threats to expose 1GB of the exfiltrated data to coerce the agency into providing the demanded ransom, reports The Record, a news site by cybersecurity firm Recorded Future.
Organizations could have their sensitive information compromised through a high-severity vulnerability in Google Cloud, Azure, and Amazon Web Services command line interface tools dubbed "LeakyCLI", The Hacker News reports.