![background](/sites/default/files/2021-11/mndt-career-hero.jpg)
Resources
Blog
Mandiant blog content has moved to new locations! See below:
![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Significant FormBook Distribution Campaigns Impacting the U.S. and South Korea
Oct 05, 2017 10 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware
Sep 20, 2017 10 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
Introducing pywintrace: A Python Wrapper for ETW
Sep 19, 2017 5 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
blog
Why Is North Korea So Interested in Bitcoin?
Sep 17, 2017 4 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY
Sep 12, 2017 4 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
Monitoring Windows Console Activity (Part 2)
Sep 01, 2017 6 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Monitoring Windows Console Activity (Part 1)
Sep 01, 2017 5 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
APT28 Targets Hospitality Sector, Presents Threat to Travelers
Aug 11, 2017 4 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science
Jul 28, 2017 2 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
![logo](https://www.mandiant.com/sites/default/files/2023-11/google-cloud-logo.png)
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.