Resources
Blog
Mandiant blog content has moved to new locations! See below:
blog
Dynamic capa: Exploring Executable Run-Time Behavior with the CAPE Sandbox
Feb 01, 2024 7 min read blog
Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
Jan 31, 2024 20 min read blog
Evolution of UNC4990: Uncovering USB Malware's Hidden Depths
Jan 30, 2024 18 min read blog
Chinese Espionage Group UNC3886 Found Exploiting CVE-2023-34048 Since Late 2021
Jan 19, 2024 2 min read blog
Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation
Jan 11, 2024 7 min read blog
Hundreds of Thousands of Dollars Worth of Solana Cryptocurrency Assets Stolen in Recent CLINKSINK Drainer Campaigns
Jan 10, 2024 7 min read blog
The Defender's Advantage Cyber Snapshot, Issue 5 — Insiders, Applications, and Mitigating Risk
Dec 14, 2023 3 min read blog
Opening a Can of Whoop Ads: Detecting and Disrupting a Malvertising Campaign Distributing Backdoors
Dec 14, 2023 21 min read blog
FLOSS for Gophers and Crabs: Extracting Strings from Go and Rust Executables
Dec 13, 2023 8 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.