Resources
Blog
Mandiant blog content has moved to new locations! See below:
threat research
Caching Out: The Value of Shimcache for Investigators
Jun 17, 2015 6 min read threat research
Hiding in Plain Sight: FireEye and Microsoft Expose Chinese APT Group’s Obfuscation Tactic
May 14, 2015 2 min read threat research
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
Apr 18, 2015 7 min read blog
FLARE IDA Pro Script Series: Applying Function Prototypes to Indirect Calls
Apr 17, 2015 4 min read threat research
Microsoft Word Intruder (MWI): A New Word Document Exploit Kit
Apr 01, 2015 12 min read threat research
FLARE IDA Pro Script Series: Generating FLAIR function patterns using IDAPython
Jan 08, 2015 6 min read threat research
Operation Double Tap
Nov 21, 2014 5 min read threat research
The FLARE On Challenge Solutions: Part 1 of 2
Nov 17, 2014 10 min read threat research
APT28 Malware: A Window into Russia's Cyber Espionage Operations?
Oct 27, 2014 2 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.