Resources
Blog
Mandiant blog content has moved to new locations! See below:
threat research
Back in a Bit: Attacker Use of the Windows Background Intelligent Transfer Service
Mar 31, 2021 9 min read threat research
Detection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities
Mar 04, 2021 6 min read threat research
New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452
Mar 04, 2021 8 min read threat research
Fuzzing Image Parsing in Windows, Part Two: Uninitialized Memory
Mar 03, 2021 14 min read threat research
So Unchill: Melting UNC2198 ICEDID to Ransomware Operations
Feb 25, 2021 14 min read threat research
Cyber Criminals Exploit Accellion FTA for Data Theft and Extortion
Feb 22, 2021 12 min read threat research
Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part One)
Feb 17, 2021 15 min read threat research
Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part Two)
Feb 17, 2021 9 min read threat research
Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication
Jan 26, 2021 4 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.