![background](/sites/default/files/2021-11/mndt-career-hero.jpg)
Resources
Blog
Mandiant blog content has moved to new locations! See below:
![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
DOSfuscation: Exploring the Depths of Cmd.exe Obfuscation and Detection Techniques
Mar 22, 2018 2 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries
Mar 16, 2018 4 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign
Mar 13, 2018 8 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
APT37 (Reaper): The Overlooked North Korean Actor
Feb 20, 2018 2 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
CVE-2017-10271 Used to Deliver CryptoMiners: An Overview of Techniques Used Post-Exploitation and Pre-Mining
Feb 15, 2018 5 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
ReelPhish: A Real-Time Two-Factor Phishing Tool
Feb 07, 2018 6 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations
Feb 03, 2018 3 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations | Blog
Feb 02, 2018 3 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
FLARE IDA Pro Script Series: Simplifying Graphs in IDA
Jan 11, 2018 12 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
![logo](https://www.mandiant.com/sites/default/files/2023-11/google-cloud-logo.png)
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.