Learn about what initial access markets are and their history by reading this blog.
Read more about how Todyl's Detection Engineering team reverse-engineered a PowerShell script to help our partners gain full understanding of new threats.
Learn more about SocGholish malware and how Todyl’s MXDR team stopped an attack in a client’s environment before it escalated.
Learn about the WebP zero-day vulnerability threatening versions of Google Chrome as well as other OS and applications, as well as how to stop it.
In this blog, we break down the .NET Loader of XWorm 4, looking at some of the key differences of previous versions, including it's modular nature, ability to monitor systems, and execute on the disk, memory, and shell levels.
Learn how to uncover and address recent attacks leveraging XWorm4. The Todyl Detection Engineering team deobfuscated the four files involved in the initial stages of the attack to drill into how to defend against it.
Learn about the recent spyboy Terminator software attack vector and how Todyl's Endpoint Security and MXDR modules help prevent it from carrying out on your systems.
In this blog, we cover how the 3CX supply chain attack originated from an earlier supply chain attack performed on Trading Technologies Inc.
Todyl is actively tracking a malicious actor campaign targeting users of the 3CX softphone telephony platform. Learn more about the campaign in our blog.