Todyl Logo
  • Platform
    
    OverviewSASESIEMMXDREndpoint SecurityGRCPricing
  • Solutions
    
    Partner Solutions
    Industry Solutions
    Use Cases
    By Partner Type
    MSPsVARs
    By Industry
    HealthcareFinancial ServicesManufacturingEducation
    By Use Case
    Identity Threat Detection & Response
  • Why Todyl
    
    Why TodylCase Studies
  • Resources
    
    BlogInsightsThreat ResearchEvents and Webinars
  • Company
    
    About UsNewsCareers
  • Login
    Book a Demo
Login
Book a Demo


Threat Intelligence

Categories

All
Compliance Management
EDR & NGAV
GRC
LZT
Life at Todyl
MXDR
Partnerships
Risk Management
SASE
SIEM
SOAR
Threat Intelligence
Threat Management
ClickFix: The Evolution of Copy-Paste Social Engineering
Threat Intelligence

ClickFix: The Evolution of Copy-Paste Social Engineering

Discover the evolution of ClickFix and how the tactic is being used in novel ways in this piece.

Keira Stevens
Jan 29, 2026

Akira Ransomware: Threat Assessment of a Scalable RaaS Operation
Threat Intelligence

Akira Ransomware: Threat Assessment of a Scalable RaaS Operation

Learn what to look for and how to address with Akira, the rising Ransomware-as-a-Service operation, in this threat assessment.

Sean Savold
Jan 22, 2026

Threat Advisory: Email Account Compromise
Threat Intelligence

Threat Advisory: Email Account Compromise

Dive into email account compromise, what it means for your organization, and how to combat it in this threat advisory.

Keira Stevens
Dec 22, 2025

Threat Advisory: Understanding the Recent SonicWall SSL VPN Vulnerability and How to Protect Your Clients
Threat Intelligence

Threat Advisory: Understanding the Recent SonicWall SSL VPN Vulnerability and How to Protect Your Clients

Recent reports of a SonicWall vulnerability being exploited by ransomware groups highlight the critical importance of proactive security monitoring and rapid response capabilities.

Andrew Scott
Sep 18, 2025

EpiBrowser: A Sophisticated PUP Masquerading as Chromium
Threat Intelligence

EpiBrowser: A Sophisticated PUP Masquerading as Chromium

Learn about Epibrowser, a potentially unwanted program posing as Chromium that may expose user data. Learn how to find and address it here.

Ahsan Ayub
Sep 17, 2025

Akira Ransomware: A Persistent Threat to MSP Operations
Threat Intelligence

Akira Ransomware: A Persistent Threat to MSP Operations

Learn about the pervasive threat of the Akira group, their use of legacy and new tactics, and how MSPs can combat them in this blog.

Keira Stevens
Sep 3, 2025

Zero-Day Attacks and False Alarms: Lessons for MSPs
Threat Intelligence

Zero-Day Attacks and False Alarms: Lessons for MSPs

Zero-day threats, real or rumored, demand MSP readiness. Learn lessons from SonicWall & Elastic cases and how to build resilient defenses.

Rajiv Motwani
Aug 26, 2025

Iran & Middle-East Geopolitical Shifts: Emerging Cyber Risks for SMBs
Threat Intelligence

Iran & Middle-East Geopolitical Shifts: Emerging Cyber Risks for SMBs

Learn how to defend yourself and your clients from ongoing geopolitical threats. Read this blog for helpful insights and action items.

David Langlands
Jun 25, 2025

Threat Advisory: SQL Injection in FortiClient CVE-2023-48788
Threat Intelligence

Threat Advisory: SQL Injection in FortiClient CVE-2023-48788

Read how attackers are exploiting the 20-year-old SQL injection technique to propagate malware in this Threat Advisory blog from Todyl's Research team.

Keira Stevens
Jun 18, 2025

Load More
Todyl Logo
X Icon | Todyl


AICPA SOC Badge | Todyl
Platform
  • Overview
  • SASE
  • SIEM
  • EDR/NGAV
  • MXDR
  • GRC
Partner Solutions
  • MSPs
  • VARs
Use Cases
  • ITDR
industry Solutions
  • Healthcare
  • Financial Services
  • Manufacturing
  • Education
Why Todyl
  • Why Todyl
  • Case Studies
  • Pricing
Resources
  • Blogs
  • Insights
  • Threat Research
  • Events
Company
  • About us
  • Contact
  • News
  • Careers

© Todyl 2026

Privacy
Terms & Conditions
System Description