![background](/sites/default/files/2021-11/mndt-career-hero.jpg)
Resources
Blog
Mandiant blog content has moved to new locations! See below:
![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
FLARE VM: The Windows Malware Analysis Distribution You’ve Always Needed!
Jul 26, 2017 7 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
HawkEye Credential Theft Malware Distributed in Recent Phishing Campaign
Jul 25, 2017 6 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
Introducing Linux Support for FakeNet-NG: FLARE’s Next Generation Dynamic Network Analysis Tool
Jul 05, 2017 5 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Obfuscation in the Wild: Targeted Attackers Lead the Way in Evasion Techniques
Jun 30, 2017 4 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
blog
Back That App Up: Gaining Root on the Lenovo Vibe
Jun 29, 2017 14 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Petya Destructive Malware Variant Spreading via Stolen Credentials and EternalBlue Exploit
Jun 27, 2017 5 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Behind the CARBANAK Backdoor
Jun 12, 2017 13 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Privileges and Credentials: Phished at the Request of Counsel
Jun 06, 2017 8 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Threat actors leverage EternalBlue exploit to deliver non-WannaCry payloads
Jun 02, 2017 3 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
![logo](https://www.mandiant.com/sites/default/files/2023-11/google-cloud-logo.png)
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.