M-unition -

Black Hat USA 2014 – Cybersecurity Under Las Vegas’
Neon Lights

It’s the middle of summer, and as the thermometers soar above 100°F the eyes of the security industry turn to Las Vegas for Black Hat 2014. The conference, August 2-7, brings the security industry’s best and brightest together for six days of training and networking. Read the rest

By Helena Brito on July 22, 2014 0

Top 10 Actions Every Board Should Follow When It Comes
to Cyber Governance

How do you augment existing governance and risk management frameworks to address the dynamic landscape of cyber threats? What do you need to do?

Here are the top ten actions every organisation’s board should follow to effectively and strategically approach cyber governance. Read the rest

By Paul Dwyer on June 16, 2014 0

A Deeper Dive into M-Trends with Richard Bejtlich

Today’s organizations are beginning to recognize the intrinsic value of a well thought-out cybersecurity strategy, and with new attacks happening daily, the stakes are much higher. Threat trends and research play a large role in understanding the adversary and helping these organizations stay ahead the curve. Read the rest

By Helena Brito on May 19, 2014 0

Live from InfoSecurity Europe 2014: Improving Detection
and Response to Cyber Threats

Live from Infosecurity Europe 2014 in London, Paul Dwyer of FireEye sat down with Dave Damato, managing director of Mandiant, and Ryan Kazanciyan, technical director of Mandiant to discuss the latest trends in cyber threat detection and incident response.

DamKaz_M

Mandiant’s Ryan Kazanciyan & David Damato

Regardless of geography, these two experts point out that the same types of threat actors exist on both sides of the pond. Read the rest

By Helena Brito on May 12, 2014 0

Android Users Beware — ‘Mandiant’-Branded Malware Identified

FireEye Labs recently identified malware for Android devices that masquerades as a Mandiant product. The malware can lock Android devices and displays a lock screen that uses the Mandiant brand.

To a victim in the United States, this lock screen may appear as:

Figure 1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

To try to make the lock message more convincing, the criminals can use a different header image depending on the victim’s country:

Banner displayed to victims in the US

Banner displayed to victims in the US

Banner displayed to victims in Australia

Banner displayed to victims in Australia

Banner displayed to victims in Ireland

Banner displayed to victims in Ireland

Banner displayed to victims in Poland

Banner displayed to victims in Poland

Banner displayed to victims in France

Banner displayed to victims in France

 

The Android malware is typically delivered by tricking the victim into installing it after visiting a malicious website. Read the rest

By FireEye Labs on May 8, 2014 0

Penetration Testing Has Come Of Age – How to Take Your Security Program to the Next Level

Today it’s hard to find an organization that operates without penetration tests. Thanks to heightened awareness on the part of the management and compliance standards such as PCI DSS, penetration tests are on every CISO’s to-do list.

Multiple varieties of penetration tests have emerged, including Black Box, White Box and even Grey Box, covering different aspects of IT setup: External Network, Internal Network, Wireless Network, Web Application, etc. Read the rest

By Vivek Chudgar on May 7, 2014 0
OLDER ENTRIES
Get M-Unition in Your Inbox:

Follow @mandiant

Follow @mandiant on twitter.

MIRcon 2014


Oct. 7-8, 2014
Washington, DC

The Mandiant Incident Response Conference (MIRcon) offers participants the opportunity to hear from some of the most influential voices in cybersecurity while networking with peers.

Sessions at MIRcon will cover best practices, case studies and instruction on important aspects of the information security terrain, including incident response, malware analysis, reverse engineering and computer forensics.

Register Today!

Career Opps @ Mandiant

We’re growing fast, but we’re as demanding as ever. Our clients come to us in their hours of need, so we need the best. That means more than just the right education and the right experience in information security.

As Mandiant continues to grow, we are able to offer certain positions in multiple locations. For details on the location(s) of each opening, please refer to the position descriptions.

Click here to view available positions.