Todyl Logo
  • Platform
    
    OverviewSASESIEMMXDREndpoint SecurityGRC
  • Solutions
    
    Partner Solutions
    Industry Solutions
    Use Cases
    By Partner Type
    MSPsVARs
    By Industry
    HealthcareFinancial ServicesManufacturingEducation
    By Use Case
    Identity Threat Detection & Response
  • Pricing
  • Resources
    
    BlogInsightsThreat ResearchEvents and Webinars
  • Why Todyl
    
    Why TodylCase Studies
  • Company
    
    About UsNewsCareers
  • Login
    Book a Demo
Login
Book a Demo


Threat Intelligence

Categories

All
Compliance Management
EDR & NGAV
GRC
LZT
Life at Todyl
MXDR
Partnerships
Risk Management
SASE
SIEM
SOAR
Threat Intelligence
Threat Management
Iran & Middle-East Geopolitical Shifts: Emerging Cyber Risks for SMBs
Threat Intelligence

Iran & Middle-East Geopolitical Shifts: Emerging Cyber Risks for SMBs

Learn how to defend yourself and your clients from ongoing geopolitical threats. Read this blog for helpful insights and action items.

David Langlands
Jun 25, 2025

Threat Advisory: SQL Injection in FortiClient CVE-2023-48788
Threat Intelligence

Threat Advisory: SQL Injection in FortiClient CVE-2023-48788

Read how attackers are exploiting the 20-year-old SQL injection technique to propagate malware in this Threat Advisory blog from Todyl's Research team.

Keira Stevens
Jun 18, 2025

Threat Advisory: LightPerlGirl Malware
Threat Intelligence

Threat Advisory: LightPerlGirl Malware

Learn about the newest threat uncovered by the Todyl team: the LightPerlGirl malware strain, propagated through ClickFix fake CAPTCHA.

Nicholas Koken
Jun 11, 2025

Threat Advisory: Business Email Compromise Campaign using OVPN for Obfuscation
Threat Intelligence

Threat Advisory: Business Email Compromise Campaign using OVPN for Obfuscation

Learn about a business email compromise campaign uncovered by Todyl MXDR and our Anomaly Detection Framework, as well as how to prevent BEC in this blog.

Erik Baba
May 23, 2025

Old is Gold: Tackling Persistent Vulnerabilities
Threat Intelligence

Old is Gold: Tackling Persistent Vulnerabilities

Despite the constant risk of new threats, attackers still use older vulnerabilities to prey on organizations. Learn why and how to address them here.

Rajiv Motwani
May 6, 2025

Decoding with CyberChef
Threat Intelligence

Decoding with CyberChef

Learn how to use CyberChef to decode and reverse engineer malware and other potential threats to your organization in this blog.

Keira Stevens
Apr 24, 2025

Dissecting the Recent Rise in 2025 Zero Days
Threat Intelligence

Dissecting the Recent Rise in 2025 Zero Days

2025 is on track to set records for new zero-day vulnerabilities. But, why the recent uptick? This blog unpacks the trends behind the increase.

Rajiv Motwani
Apr 17, 2025

Threat Advisory: PDFast Freeware Compromise
Threat Intelligence

Threat Advisory: PDFast Freeware Compromise

Todyl MXDR team identified malware distribution within a free PDF software. Read this blog to learn how it works and how you can prevent it from affecting your organization.

Nicholas Koken
Apr 17, 2025

ClickFix: Fake Captcha Leads to Real Damage
Threat Intelligence

ClickFix: Fake Captcha Leads to Real Damage

ClickFix is a fake captcha scam gaining recent notoriety. Learn how it works and how to protect your business in this blog.

Keira Stevens
Mar 19, 2025

Previous
Load More
Todyl Logo
X Icon | Todyl


AICPA SOC Badge | Todyl
Platform
  • Overview
  • SASE
  • SIEM
  • EDR/NGAV
  • MXDR
  • GRC
Partner Solutions
  • MSPs
  • VARs
Use Cases
  • ITDR
industry Solutions
  • Healthcare
  • Financial Services
  • Manufacturing
  • Education
Why Todyl
  • Why Todyl
  • Case Studies
  • Pricing
Resources
  • Blogs
  • Insights
  • Threat Research
  • Events
Company
  • About us
  • Contact
  • News
  • Careers

© Todyl 2026

Privacy
Terms & Conditions
System Description