Todyl's logo
  • Platform
    
    OverviewSASESIEMMXDREndpoint SecurityGRCPricing
  • Solutions
    
    Partner Solutions
    Industry Solutions
    Use Cases
    By Partner Type
    MSPsVARs
    By Industry
    HealthcareFinancial ServicesManufacturingEducation
    By Use Case
    Identity Threat Detection & Response
  • Why Todyl
    
    Why TodylCase Studies
  • Resources
    
    BlogInsightsThreat ResearchEvents and Webinars
  • Company
    
    About UsNewsCareers
  • Login
  • Book a Demo
Login
Book a Demo


Threat Intelligence

Categories

All
Compliance Management
EDR & NGAV
GRC
LZT
Life at Todyl
MXDR
Partnerships
Risk Management
SASE
SIEM
SOAR
Threat Intelligence
Threat Management
Investigating Malicious Use of OneNote to Deploy Qbot
Threat Intelligence

Investigating Malicious Use of OneNote to Deploy Qbot

On February 3rd, 2023, Todyl's MXDR observed threat actors using OneNote to deploy Qbot. This blog explores what the attack chain looks like and the key takeaways for businesses.

Nicholas Koken
Feb 3, 2023

Threat Advisory: CISA Warns of Malicious Use of Legitimate RMM Tools
Threat Intelligence

Threat Advisory: CISA Warns of Malicious Use of Legitimate RMM Tools

CISA, the NSA, and MS-ISAC released a joint advisory warning organizations that threat actors are using legitimate RMM tools to control victim machines after initial compromise. Get the key takeaways here.

David Langlands
Jan 26, 2023

Threat Advisory: New IcedID Trojan Campaign
Threat Intelligence

Threat Advisory: New IcedID Trojan Campaign

On November 17, 2022 Todyl’s MXDR team observed new infections from a campaign that included the IcedID Trojan. This new activity targets users in the US with IRS notifications and file names.

David Langlands
Nov 18, 2022

LAPSUS$, Okta, and Detecting Malicious Activity in Your Environments
Threat Intelligence

LAPSUS$, Okta, and Detecting Malicious Activity in Your Environments

In this blog, we provide background on LAPSUS$, a high-level overview of the Okta breach, and ways Todyl can help to detect and identify malicious activity.

Nicholas Koken
Apr 4, 2022

Threat Advisory: PwnKit Local Privilege Escalation
Threat Intelligence

Threat Advisory: PwnKit Local Privilege Escalation

On January 25, 2022, a Local Privilege Escalation Vulnerability was disclosed by Qualys. Todyl's Detection and Response Team implemented detection rules and is closely monitoring developments.

David Langlands
Jan 26, 2022

Previous
Todyl's logo
X Icon | Todyl


AICPA SOC Badge | Todyl
Platform
  • Overview
  • SASE
  • SIEM
  • EDR/NGAV
  • MXDR
  • GRC
Partner Solutions
  • MSPs
  • VARs
Use Cases
  • ITDR
Industry Solutions
  • Healthcare
  • Financial Services
  • Manufacturing
  • Education
Why Todyl
  • Why Todyl
  • Case Studies
  • Pricing
Resources
  • Blogs
  • Insights
  • Threat Research
  • Events
Company
  • About us
  • Contact
  • News
  • Careers

© Todyl 2025

Privacy
Terms & Conditions
System Description