Resources
Blog
Mandiant blog content has moved to new locations! See below:
threat research
Reverse Engineering the Analyst: Building Machine Learning Models for the SOC
Jun 05, 2018 14 min readRemote Authentication GeoFeasibility Tool - GeoLogonalyzer
May 29, 2018 8 min read threat research
Shining a Light on OAuth Abuse with PwnAuth
May 21, 2018 7 min read threat research
A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan
May 14, 2018 6 min read blog
Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World
May 04, 2018 7 min readEstablishing a Baseline for Remote Desktop Protocol
Apr 26, 2018 8 min readLoading Kernel Shellcode
Apr 23, 2018 7 min readHow the Rise of Cryptocurrencies Is Shaping the Cyber Crime Landscape: Blockchain Infrastructure Use
Apr 18, 2018 11 min readFake Software Update Abuses NetSupport Remote Access Tool
Apr 05, 2018 6 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.