Resources
Blog
Mandiant blog content has moved to new locations! See below:
blog
Evacuation and Humanitarian Documents used to Spear Phish Ukrainian Entities
Jul 20, 2022 12 min read blog
Preventing and Remediating External Asset Exposures
Jul 18, 2022 4 min read blog
Abusing Duo Authentication Misconfigurations in Windows and Active Directory Environments
Jul 14, 2022 23 min read blog
Get Your Kicks on Route Sixty-Sink: Identifying Vulnerabilities Using Automated Static Analysis
Jul 06, 2022 8 min read blog
Fuzzing Image Parsing in Windows, Part Four: More HEIF
Jul 05, 2022 6 min read blog
Burrowing your way into VPNs, Proxies, and Tunnels
Jun 29, 2022 26 min read blog
Pro-PRC DRAGONBRIDGE Influence Campaign Targets Rare Earths Mining Companies in Attempt to Thwart Rivalry to PRC Market Dominance
Jun 28, 2022 8 min read blog
Attack Surface Management Identifies Critical Issues
Jun 24, 2022 2 min read blog
FLOSS Version 2.0
Jun 21, 2022 5 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.