Read how attackers are exploiting the 20-year-old SQL injection technique to propagate malware in this Threat Advisory blog from Todyl's Research team.
Learn about the newest threat uncovered by the Todyl team: the LightPerlGirl malware strain, propagated through ClickFix fake CAPTCHA.
2025 is on track to set records for new zero-day vulnerabilities. But, why the recent uptick? This blog unpacks the trends behind the increase.
Todyl MXDR team identified malware distribution within a free PDF software. Read this blog to learn how it works and how you can prevent it from affecting your organization.
In order to keep pace with modern cyberthreats, organizations need to rethink their approach to vulnerability remediation. Learn what you need to consider here.
Learn about the recent FortiJump vulnerability and how Todyl is working to prevent it and uncover more insights into the threat actors.
In this blog, we provide details about the CrowdStrike incident, including a technical analysis of what occurred.
See how you can defend your organization from attacks arising from initial access markets by implementing defense-in-depth. Read the blog today.
Learn about what techniques brokers use to fuel initial access markets, and what attackers do with the credentials they purchase.