Resources
Blog
Mandiant blog content has moved to new locations! See below:
threat research
Evasive Tactics: Taidoor
Sep 06, 2013 5 min read threat research
Did It Execute?
Aug 27, 2013 5 min read threat research
Breaking Down the China Chopper Web Shell - Part II
Aug 09, 2013 6 min read threat research
Breaking Down the China Chopper Web Shell - Part I
Aug 07, 2013 7 min read blog
Applying Function Types to Structure Fields in IDA
Jun 19, 2013 4 min read threat research
Malware Callbacks
Apr 23, 2013 3 min readMandiant Exposes APT1 – One of China's Cyber Espionage Units & Releases 3,000 Indicators
Feb 19, 2013 3 min read threat research
Using Precalculated String Hashes when Reverse Engineering Shellcode
Nov 29, 2012 6 min read threat research
Tearing up the Windows Registry with python-registry
Jul 21, 2011 7 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.