• Platform
    
    OverviewSASESIEMMXDREndpoint SecurityGRC
  • Solutions
    
    Partner Solutions
    Industry Solutions
    Use Cases
    By Partner Type
    MSPsVARs
    By Industry
    HealthcareFinancial ServicesManufacturingEducation
    By Use Case
    Identity Threat Detection & Response
  • Why Todyl
    
    Why UsCase StudiesPricing
  • Resources
    
    BlogInsightsThreat ResearchEvents and Webinars
  • Company
    
    About UsNewsCareers
  • Login
  • Book a Demo
Login
Book a Demo


Threat Intelligence

Categories

All
Business Growth
Compliance
Cybersecurity Education
Endpoint Security
Life at Todyl
Managed eXtended Detection and Response
Secure Access Service Edge
Security Information & Event Management
Threat Intelligence
Zero Trust
Threat Advisory: SQL Injection in FortiClient CVE-2023-48788
Threat Intelligence

Threat Advisory: SQL Injection in FortiClient CVE-2023-48788

Read how attackers are exploiting the 20-year-old SQL injection technique to propagate malware in this Threat Advisory blog from Todyl's Research team.

Keira Stevens
Jun 18, 2025

Threat Advisory: LightPerlGirl Malware
Threat Intelligence

Threat Advisory: LightPerlGirl Malware

Learn about the newest threat uncovered by the Todyl team: the LightPerlGirl malware strain, propagated through ClickFix fake CAPTCHA.

Jun 11, 2025

Dissecting the Recent Rise in 2025 Zero Days
Threat Intelligence

Dissecting the Recent Rise in 2025 Zero Days

2025 is on track to set records for new zero-day vulnerabilities. But, why the recent uptick? This blog unpacks the trends behind the increase.

Rajiv Motwani
Apr 17, 2025

Threat Advisory: PDFast Freeware Compromise
Threat Intelligence

Threat Advisory: PDFast Freeware Compromise

Todyl MXDR team identified malware distribution within a free PDF software. Read this blog to learn how it works and how you can prevent it from affecting your organization.

Nicholas Koken
Apr 17, 2025

Two Truths, Double Whammy: Why Vulnerability Remediation Needs a Rethink
Threat Intelligence

Two Truths, Double Whammy: Why Vulnerability Remediation Needs a Rethink

In order to keep pace with modern cyberthreats, organizations need to rethink their approach to vulnerability remediation. Learn what you need to consider here.

Rajiv Motwani
Feb 27, 2025

FortiJump: The FortiManager Zero-Day Vulnerability Explained
Threat Intelligence

FortiJump: The FortiManager Zero-Day Vulnerability Explained

Learn about the recent FortiJump vulnerability and how Todyl is working to prevent it and uncover more insights into the threat actors.

David Langlands
Oct 28, 2024

CrowdStrike Incident and Threat Update
Threat Intelligence

CrowdStrike Incident and Threat Update

In this blog, we provide details about the CrowdStrike incident, including a technical analysis of what occurred.

David Langlands
Jul 19, 2024

Understanding initial access markets: Defense-in-depth
Threat Intelligence

Understanding initial access markets: Defense-in-depth

See how you can defend your organization from attacks arising from initial access markets by implementing defense-in-depth. Read the blog today.

Nicholas Koken
Mar 12, 2024

Understanding initial access markets: Attack techniques
Threat Intelligence

Understanding initial access markets: Attack techniques

Learn about what techniques brokers use to fuel initial access markets, and what attackers do with the credentials they purchase.

Nicholas Koken
Mar 11, 2024

Load More
X Icon | Todyl


AICPA SOC Badge | Todyl
Platform
  • Overview
  • SASE
  • SIEM
  • EDR/NGAV
  • MXDR
  • GRC
Partner Solutions
  • MSPs
  • VARs
Industry Solutions
  • Healthcare
  • Financial Services
  • Manufacturing
  • Education
Why Todyl
  • Why Todyl
  • Case Studies
  • Pricing
Resources
  • Blogs
  • Insights
  • Threat Research
  • Events
Company
  • About us
  • Contact
  • News
  • Careers

© Todyl 2025

Privacy
Terms & Conditions
System Description