Todyl Logo
  • Platform
    
    OverviewSASESIEMMXDREndpoint SecurityGRC
  • Solutions
    
    Partner Solutions
    Industry Solutions
    Use Cases
    By Partner Type
    MSPsVARs
    By Industry
    HealthcareFinancial ServicesManufacturingEducation
    By Use Case
    Identity Threat Detection & Response
  • Pricing
  • Resources
    
    BlogInsightsThreat ResearchEvents and Webinars
  • Why Todyl
    
    Why TodylCase Studies
  • Company
    
    About UsNewsCareers
  • Login
    Book a Demo
Login
Book a Demo


Threat Intelligence

Categories

All
Compliance Management
EDR & NGAV
GRC
LZT
Life at Todyl
MXDR
Partnerships
Risk Management
SASE
SIEM
SOAR
Threat Intelligence
Threat Management
Threat Advisory: XWorm 4, Part 1 – File Deobfuscation
Threat Intelligence

Threat Advisory: XWorm 4, Part 1 – File Deobfuscation

Learn how to uncover and address recent attacks leveraging XWorm4. The Todyl Detection Engineering team deobfuscated the four files involved in the initial stages of the attack to drill into how to defend against it.

David Langlands
Jun 15, 2023

Threat Advisory: spyboy and The Vulnerable Driver TTP
Threat Intelligence

Threat Advisory: spyboy and The Vulnerable Driver TTP

Learn about the recent spyboy Terminator software attack vector and how Todyl's Endpoint Security and MXDR modules help prevent it from carrying out on your systems.

David Langlands
May 31, 2023

3CX Software Supply Chain Attack: How it Started
Threat Intelligence

3CX Software Supply Chain Attack: How it Started

In this blog, we cover how the 3CX supply chain attack originated from an earlier supply chain attack performed on Trading Technologies Inc.

David Langlands
Apr 20, 2023

Threat Advisory: 3CX Softphone Telephony Campaign
Threat Intelligence

Threat Advisory: 3CX Softphone Telephony Campaign

Todyl is actively tracking a malicious actor campaign targeting users of the 3CX softphone telephony platform. Learn more about the campaign in our blog.

David Langlands
Mar 29, 2023

Investigating Malicious Use of OneNote to Deploy Qbot
Threat Intelligence

Investigating Malicious Use of OneNote to Deploy Qbot

On February 3rd, 2023, Todyl's MXDR observed threat actors using OneNote to deploy Qbot. This blog explores what the attack chain looks like and the key takeaways for businesses.

Nicholas Koken
Feb 3, 2023

Threat Advisory: CISA Warns of Malicious Use of Legitimate RMM Tools
Threat Intelligence

Threat Advisory: CISA Warns of Malicious Use of Legitimate RMM Tools

CISA, the NSA, and MS-ISAC released a joint advisory warning organizations that threat actors are using legitimate RMM tools to control victim machines after initial compromise. Get the key takeaways here.

David Langlands
Jan 26, 2023

Threat Advisory: New IcedID Trojan Campaign
Threat Intelligence

Threat Advisory: New IcedID Trojan Campaign

On November 17, 2022 Todyl’s MXDR team observed new infections from a campaign that included the IcedID Trojan. This new activity targets users in the US with IRS notifications and file names.

David Langlands
Nov 18, 2022

LAPSUS$, Okta, and Detecting Malicious Activity in Your Environments
Threat Intelligence

LAPSUS$, Okta, and Detecting Malicious Activity in Your Environments

In this blog, we provide background on LAPSUS$, a high-level overview of the Okta breach, and ways Todyl can help to detect and identify malicious activity.

Nicholas Koken
Apr 4, 2022

Threat Advisory: PwnKit Local Privilege Escalation
Threat Intelligence

Threat Advisory: PwnKit Local Privilege Escalation

On January 25, 2022, a Local Privilege Escalation Vulnerability was disclosed by Qualys. Todyl's Detection and Response Team implemented detection rules and is closely monitoring developments.

David Langlands
Jan 26, 2022

Previous
Todyl Logo
X Icon | Todyl


AICPA SOC Badge | Todyl
Platform
  • Overview
  • SASE
  • SIEM
  • EDR/NGAV
  • MXDR
  • GRC
Partner Solutions
  • MSPs
  • VARs
Use Cases
  • ITDR
industry Solutions
  • Healthcare
  • Financial Services
  • Manufacturing
  • Education
Why Todyl
  • Why Todyl
  • Case Studies
  • Pricing
Resources
  • Blogs
  • Insights
  • Threat Research
  • Events
Company
  • About us
  • Contact
  • News
  • Careers

© Todyl 2026

Privacy
Terms & Conditions
System Description