Resources
Blog
Mandiant blog content has moved to new locations! See below:
blog
In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate Adversary Behaviors
Sep 29, 2020 11 min read threat research
Fuzzing Image Parsing in Windows, Part One: Color Profiles
Sep 24, 2020 8 min read blog
Uniting Security Superpowers: Mandiant Solutions and Microsoft Working Together for Better Security Outcomes
Sep 22, 2020 5 min read threat research
A "DFUR-ent" Perspective on Threat Modeling and Application Log Forensic Analysis
Sep 14, 2020 9 min read threat research
Emulation of Malicious Shellcode With Speakeasy
Aug 26, 2020 15 min read threat research
A Hands-On Introduction to Mandiant's Approach to OT Red Teaming
Aug 25, 2020 12 min read threat research
COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
Aug 11, 2020 5 min read threat research
Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle Approach
Aug 06, 2020 15 min read threat research
Repurposing Neural Networks to Generate Synthetic Media for Information Operations
Aug 05, 2020 14 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.