Todyl Logo
  • Platform
    
    OverviewSASESIEMMXDREndpoint SecurityGRC
  • Solutions
    
    Partner Solutions
    Industry Solutions
    Use Cases
    By Partner Type
    MSPsVARs
    By Industry
    HealthcareFinancial ServicesManufacturingEducation
    By Use Case
    Identity Threat Detection & Response
  • Pricing
  • Resources
    
    BlogInsightsThreat ResearchEvents and Webinars
  • Why Todyl
    
    Why TodylCase Studies
  • Company
    
    About UsNewsCareers
  • Login
    Book a Demo
Login
Book a Demo


Threat Intelligence

Categories

All
Compliance Management
EDR & NGAV
GRC
LZT
Life at Todyl
MXDR
Partnerships
Risk Management
SASE
SIEM
SOAR
Threat Intelligence
Threat Management
Threat Advisory: Critical WebP Zero-Day
Threat Intelligence

Threat Advisory: Critical WebP Zero-Day

Learn about the WebP zero-day vulnerability threatening versions of Google Chrome as well as other OS and applications, as well as how to stop it.

David Langlands
Sep 28, 2023

Threat Advisory: XWorm, Part 2 – Breaking Down the .NET Loader and v4.0
Threat Intelligence

Threat Advisory: XWorm, Part 2 – Breaking Down the .NET Loader and v4.0

In this blog, we break down the .NET Loader of XWorm 4, looking at some of the key differences of previous versions, including it's modular nature, ability to monitor systems, and execute on the disk, memory, and shell levels.

David Langlands
Jun 22, 2023

Threat Advisory: XWorm 4, Part 1 – File Deobfuscation
Threat Intelligence

Threat Advisory: XWorm 4, Part 1 – File Deobfuscation

Learn how to uncover and address recent attacks leveraging XWorm4. The Todyl Detection Engineering team deobfuscated the four files involved in the initial stages of the attack to drill into how to defend against it.

David Langlands
Jun 15, 2023

Threat Advisory: spyboy and The Vulnerable Driver TTP
Threat Intelligence

Threat Advisory: spyboy and The Vulnerable Driver TTP

Learn about the recent spyboy Terminator software attack vector and how Todyl's Endpoint Security and MXDR modules help prevent it from carrying out on your systems.

David Langlands
May 31, 2023

3CX Software Supply Chain Attack: How it Started
Threat Intelligence

3CX Software Supply Chain Attack: How it Started

In this blog, we cover how the 3CX supply chain attack originated from an earlier supply chain attack performed on Trading Technologies Inc.

David Langlands
Apr 20, 2023

Threat Advisory: 3CX Softphone Telephony Campaign
Threat Intelligence

Threat Advisory: 3CX Softphone Telephony Campaign

Todyl is actively tracking a malicious actor campaign targeting users of the 3CX softphone telephony platform. Learn more about the campaign in our blog.

David Langlands
Mar 29, 2023

Investigating Malicious Use of OneNote to Deploy Qbot
Threat Intelligence

Investigating Malicious Use of OneNote to Deploy Qbot

On February 3rd, 2023, Todyl's MXDR observed threat actors using OneNote to deploy Qbot. This blog explores what the attack chain looks like and the key takeaways for businesses.

Nicholas Koken
Feb 3, 2023

Threat Advisory: CISA Warns of Malicious Use of Legitimate RMM Tools
Threat Intelligence

Threat Advisory: CISA Warns of Malicious Use of Legitimate RMM Tools

CISA, the NSA, and MS-ISAC released a joint advisory warning organizations that threat actors are using legitimate RMM tools to control victim machines after initial compromise. Get the key takeaways here.

David Langlands
Jan 26, 2023

Threat Advisory: New IcedID Trojan Campaign
Threat Intelligence

Threat Advisory: New IcedID Trojan Campaign

On November 17, 2022 Todyl’s MXDR team observed new infections from a campaign that included the IcedID Trojan. This new activity targets users in the US with IRS notifications and file names.

David Langlands
Nov 18, 2022

Previous
Load More
Todyl Logo
X Icon | Todyl


AICPA SOC Badge | Todyl
Platform
  • Overview
  • SASE
  • SIEM
  • EDR/NGAV
  • MXDR
  • GRC
Partner Solutions
  • MSPs
  • VARs
Use Cases
  • ITDR
industry Solutions
  • Healthcare
  • Financial Services
  • Manufacturing
  • Education
Why Todyl
  • Why Todyl
  • Case Studies
  • Pricing
Resources
  • Blogs
  • Insights
  • Threat Research
  • Events
Company
  • About us
  • Contact
  • News
  • Careers

© Todyl 2026

Privacy
Terms & Conditions
System Description