Read expert perspectives and industry news.
Now You See Me - H-worm by Houdini09.24.2013 Sep 24, 2013 | 5 mins read Blog
Evasive Tactics: Taidoor09.06.2013 Sep 06, 2013 | 5 mins read Blog
Did It Execute?08.27.2013 Aug 27, 2013 | 5 mins read Blog
Breaking Down the China Chopper Web Shell - Part II08.09.2013 Aug 09, 2013 | 6 mins read Blog
Breaking Down the China Chopper Web Shell - Part I08.07.2013 Aug 07, 2013 | 7 mins read Blog
Malware Callbacks04.23.2013 Apr 23, 2013 | 3 mins read Blog
Mandiant Exposes APT1 – One of China's Cyber Espionage Units & Releases 3,000 Indicators02.19.2013 Feb 19, 2013 | 3 mins read Blog
Using Precalculated String Hashes when Reverse Engineering Shellcode11.30.2012 Nov 30, 2012 | 6 mins read Blog
Tearing up the Windows Registry with python-registry07.21.2011 Jul 21, 2011 | 7 mins read Blog
Chasing CnC Servers - False positives09.23.2010 Sep 23, 2010 | 7 mins read Blog
Reversing Malware Command and Control: From Sockets to COM08.16.2010 Aug 16, 2010 | 9 mins read Blog
Malware Persistence without the Windows Registry07.15.2010 Jul 15, 2010 | 7 mins read
M-Trends 2022: Mandiant Special Report
The 13th edition of M-Trends provides critical insights on trending attacker behaviors that help security teams improve security strategy, planning and investment.
Mark Your Calendars for mWISE(TM) Conference 2022
Cyber Defense Summit is now Mandiant Worldwide Information Security Exchange (mWISE)! Registration opens mid-June.