Cyber Threat Intelligence
Understand and proactively protect against threat actors targeting you and your peers.
Latest Threat Intelligence
Indicators of Compromise Scanner for Citrix ADC Zero-Day (CVE-2023-3519)
Aug 14, 2023 4 min readDetecting Microsoft 365 and Azure Active Directory Backdoors
Sep 30, 2020 11 min readAPT38: Details on New North Korean Regime-Backed Threat Group
Oct 03, 2018 5 min readMandiant Advantage Threat Intelligence
Explore Mandiant frontline research and access exclusive intelligence reports.
Why Mandiant Threat Intelligence?
Get critical insights into the latest relevant threats as Mandiant blends open-source data with proprietary frontline observations.
Protection Guides
Making threat intelligence actionable is critical to cyber defense. Our detailed guides help you understand and apply threat intelligence.
Proactive Preparation and Hardening to Prevent Against Destructive Attacks
Includes hardening and detection guidance to protect against a destructive attack or other security incident within your environment.
Ransomware Protection and Containment Strategies
Practical guidance for endpoint protection, hardening and containment.
Linux Endpoint Hardening to Protect Against Malware and Destructive Attacks
This paper provides recommendations to protect Linux endpoints from adversarial abuse.
You Might Also Be Interested In
Better Together: The Benefits of Integrating Cyber Threat Intelligence and Risk Management
Best practices for CTI and risk professionals to work together. Improving collaboration begins with building mutual understanding.
Remediation and Hardening Strategies for Microsoft 365 to Defend Against APT29
Learn how to proactively harden and remediate your environments against attack techniques used by APT29.
The Defender’s Advantage Cyber Snapshot
Get insights into today’s top cyber defense topics based on Mandiant frontline, real-world experience.
Global Perspectives on Threat Intelligence Report from Mandiant
Learn the key challenges facing cyber security decision-makers from organizations around the world and key actions required to solidify your cyber readiness. Get the Global Perspectives on Threat Intelligence report today.