Resources
Blog
Mandiant blog content has moved to new locations! See below:
threat research
DOSfuscation: Exploring the Depths of Cmd.exe Obfuscation and Detection Techniques
Mar 22, 2018 2 min read threat research
Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries
Mar 16, 2018 4 min read threat research
Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign
Mar 13, 2018 8 min read threat research
APT37 (Reaper): The Overlooked North Korean Actor
Feb 20, 2018 2 min read threat research
CVE-2017-10271 Used to Deliver CryptoMiners: An Overview of Techniques Used Post-Exploitation and Pre-Mining
Feb 15, 2018 5 min read threat research
ReelPhish: A Real-Time Two-Factor Phishing Tool
Feb 07, 2018 6 min read threat research
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations
Feb 03, 2018 3 min readAttacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations | Blog
Feb 02, 2018 3 min readFLARE IDA Pro Script Series: Simplifying Graphs in IDA
Jan 11, 2018 12 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.