Resources
Blog
Mandiant blog content has moved to new locations! See below:
threat research
Automatically Extracting Obfuscated Strings from Malware using the FireEye Labs Obfuscated String Solver (FLOSS)
Jun 23, 2016 9 min read blog
IRONGATE ICS Malware: Nothing to See Here...Masking Malicious Activity on SCADA Systems
Jun 02, 2016 8 min read threat research
Targeted Attacks against Banks in the Middle East
May 22, 2016 6 min read threat research
How RTF malware evades static signature-based detection
May 20, 2016 8 min read threat research
Threat Actor Leverages Windows Zero-day Exploit in Payment Card Data Attacks
May 11, 2016 4 min read blog
Exploiting CVE-2016-2060 on Qualcomm Devices
May 05, 2016 12 min read threat research
Deobfuscating Python Bytecode
May 03, 2016 6 min read threat research
Two-factor Authentication Best Practices: 99 Problems but Two-Factor Ain’t One
Mar 23, 2016 13 min read threat research
Greater Visibility Through PowerShell Logging
Feb 11, 2016 8 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.