Resources
Blog
Mandiant blog content has moved to new locations! See below:
threat research
Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction
Jan 21, 2021 10 min read threat research
Emulation of Kernel Mode Rootkits With Speakeasy
Jan 20, 2021 10 min read threat research
Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452 | Blog
Jan 19, 2021 5 min read threat research
SUNBURST Additional Technical Details
Dec 24, 2020 18 min read threat research
DebUNCing Attribution: How Mandiant Tracks Uncategorized Threat Actors
Dec 17, 2020 5 min read threat research
Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
Dec 13, 2020 16 min read threat research
Unauthorized Access of FireEye Red Team Tools
Dec 08, 2020 3 min read threat research
Using Speakeasy Emulation Framework Programmatically to Unpack Malware
Dec 01, 2020 13 min read threat research
Election Cyber Threats in the Asia-Pacific Region
Nov 22, 2020 6 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.