Todyl's logo
  • Platform
    
    OverviewSASESIEMMXDREndpoint SecurityGRCPricing
  • Solutions
    
    Partner Solutions
    Industry Solutions
    Use Cases
    By Partner Type
    MSPsVARs
    By Industry
    HealthcareFinancial ServicesManufacturingEducation
    By Use Case
    Identity Threat Detection & Response
  • Why Todyl
    
    Why TodylCase Studies
  • Resources
    
    BlogInsightsThreat ResearchEvents and Webinars
  • Company
    
    About UsNewsCareers
  • Login
  • Book a Demo
Login
Book a Demo


Threat Intelligence

Categories

All
Compliance Management
EDR & NGAV
GRC
LZT
Life at Todyl
MXDR
Partnerships
Risk Management
SASE
SIEM
SOAR
Threat Intelligence
Threat Management
Understanding initial access markets: A brief history
Threat Intelligence

Understanding initial access markets: A brief history

Learn about what initial access markets are and their history by reading this blog.

Nicholas Koken
Feb 23, 2024

Todyl Detection Engineering deep-dive: A stroll through PowerShell script reversing
Threat Intelligence

Todyl Detection Engineering deep-dive: A stroll through PowerShell script reversing

Read more about how Todyl's Detection Engineering team reverse-engineered a PowerShell script to help our partners gain full understanding of new threats.

Nicholas Koken
Jan 19, 2024

Threat advisory: SocGholish malware
Threat Intelligence

Threat advisory: SocGholish malware

Learn more about SocGholish malware and how Todyl’s MXDR team stopped an attack in a client’s environment before it escalated.

David Langlands
Jan 18, 2024

Threat Advisory: Critical WebP Zero-Day
Threat Intelligence

Threat Advisory: Critical WebP Zero-Day

Learn about the WebP zero-day vulnerability threatening versions of Google Chrome as well as other OS and applications, as well as how to stop it.

David Langlands
Sep 28, 2023

Threat Advisory: XWorm, Part 2 – Breaking Down the .NET Loader and v4.0
Threat Intelligence

Threat Advisory: XWorm, Part 2 – Breaking Down the .NET Loader and v4.0

In this blog, we break down the .NET Loader of XWorm 4, looking at some of the key differences of previous versions, including it's modular nature, ability to monitor systems, and execute on the disk, memory, and shell levels.

David Langlands
Jun 22, 2023

Threat Advisory: XWorm 4, Part 1 – File Deobfuscation
Threat Intelligence

Threat Advisory: XWorm 4, Part 1 – File Deobfuscation

Learn how to uncover and address recent attacks leveraging XWorm4. The Todyl Detection Engineering team deobfuscated the four files involved in the initial stages of the attack to drill into how to defend against it.

David Langlands
Jun 15, 2023

Threat Advisory: spyboy and The Vulnerable Driver TTP
Threat Intelligence

Threat Advisory: spyboy and The Vulnerable Driver TTP

Learn about the recent spyboy Terminator software attack vector and how Todyl's Endpoint Security and MXDR modules help prevent it from carrying out on your systems.

David Langlands
May 31, 2023

3CX Software Supply Chain Attack: How it Started
Threat Intelligence

3CX Software Supply Chain Attack: How it Started

In this blog, we cover how the 3CX supply chain attack originated from an earlier supply chain attack performed on Trading Technologies Inc.

David Langlands
Apr 20, 2023

Threat Advisory: 3CX Softphone Telephony Campaign
Threat Intelligence

Threat Advisory: 3CX Softphone Telephony Campaign

Todyl is actively tracking a malicious actor campaign targeting users of the 3CX softphone telephony platform. Learn more about the campaign in our blog.

David Langlands
Mar 29, 2023

Previous
Load More
Todyl's logo
X Icon | Todyl


AICPA SOC Badge | Todyl
Platform
  • Overview
  • SASE
  • SIEM
  • EDR/NGAV
  • MXDR
  • GRC
Partner Solutions
  • MSPs
  • VARs
Use Cases
  • ITDR
Industry Solutions
  • Healthcare
  • Financial Services
  • Manufacturing
  • Education
Why Todyl
  • Why Todyl
  • Case Studies
  • Pricing
Resources
  • Blogs
  • Insights
  • Threat Research
  • Events
Company
  • About us
  • Contact
  • News
  • Careers

© Todyl 2025

Privacy
Terms & Conditions
System Description