![background](/sites/default/files/2021-11/mndt-career-hero.jpg)
Resources
Blog
Mandiant blog content has moved to new locations! See below:
![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Evasive Tactics: Taidoor
Sep 06, 2013 5 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Did It Execute?
Aug 27, 2013 5 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Breaking Down the China Chopper Web Shell - Part II
Aug 09, 2013 6 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Breaking Down the China Chopper Web Shell - Part I
Aug 07, 2013 7 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
blog
Applying Function Types to Structure Fields in IDA
Jun 19, 2013 4 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Malware Callbacks
Apr 23, 2013 3 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
Mandiant Exposes APT1 – One of China's Cyber Espionage Units & Releases 3,000 Indicators
Feb 19, 2013 3 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Using Precalculated String Hashes when Reverse Engineering Shellcode
Nov 29, 2012 6 min read![](/sites/default/files/2023-01/blog-thumb.jpg)
threat research
Tearing up the Windows Registry with python-registry
Jul 21, 2011 7 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
![logo](https://www.mandiant.com/sites/default/files/2023-11/google-cloud-logo.png)
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.