![background](/sites/default/files/2021-11/mndt-career-hero.jpg)
Resources
Blog
Mandiant blog content has moved to new locations! See below:
![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Caching Out: The Value of Shimcache for Investigators
Jun 17, 2015 6 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Hiding in Plain Sight: FireEye and Microsoft Expose Chinese APT Group’s Obfuscation Tactic
May 14, 2015 2 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
Apr 18, 2015 7 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
blog
FLARE IDA Pro Script Series: Applying Function Prototypes to Indirect Calls
Apr 17, 2015 4 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Microsoft Word Intruder (MWI): A New Word Document Exploit Kit
Apr 01, 2015 12 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
FLARE IDA Pro Script Series: Generating FLAIR function patterns using IDAPython
Jan 08, 2015 6 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Operation Double Tap
Nov 21, 2014 5 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
The FLARE On Challenge Solutions: Part 1 of 2
Nov 17, 2014 10 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
APT28 Malware: A Window into Russia's Cyber Espionage Operations?
Oct 27, 2014 2 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
![logo](https://www.mandiant.com/sites/default/files/2023-11/google-cloud-logo.png)
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.