The APT actor, ToddyCat, has been linked to a new set of malicious tools intended for data exfiltration. Cybersecurity firm Kaspersky previously connected ToddyCat to attacks against entities in Europe and Asia. The group’s arsenal includes a variety of malware and compromised admin credentials. Check Point has also revealed that the actor has targeted Asian government and telecom entities since 2021, using disposable malware to evade detection.
.webp?w=0&resize=0,0&ssl=1)
Top 10 Best Static Application Security Testing (SAST) Tools for Security Teams in 2026
The complexity of modern software development requires security to be deeply embedded within the engineering pipeline rather than treated as an afterthought. Whether you are

