Resources
Blog
Mandiant blog content has moved to new locations! See below:
threat research
Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents
May 07, 2020 18 min read threat research
Excelerating Analysis, Part 2 — X[LOOKUP] Gon’ Pivot To Ya
Apr 28, 2020 9 min readPutting the Model to Work: Enabling Defenders With Vulnerability Intelligence — Intelligence for Vulnerability Management, Part Four
Apr 27, 2020 9 min read threat research
Vietnamese Threat Actors APT32 Targeting Wuhan Government and Chinese Ministry of Emergency Management in Latest Example of COVID-19 Related Espionage
Apr 22, 2020 3 min read threat research
Separating the Signal from the Noise: How Mandiant Intelligence Rates Vulnerabilities — Intelligence for Vulnerability Management, Part Three
Apr 20, 2020 8 min read threat research
Think Fast: Time Between Disclosure, Patch Release and Vulnerability Exploitation — Intelligence for Vulnerability Management, Part Two
Apr 13, 2020 6 min read threat research
Limited Shifts in the Cyber Threat Landscape Driven by COVID-19
Apr 08, 2020 6 min read threat research
Zero-Day Exploitation Increasingly Demonstrates Access to Money, Rather than Skill — Intelligence for Vulnerability Management, Part One
Apr 06, 2020 5 min read threat research
FakeNet Genie: Improving Dynamic Malware Analysis with Cheat Codes for FakeNet-NG
Apr 02, 2020 11 min readPrepare for 2024's cybersecurity landscape.
Get the Google Cloud Cybersecurity Forecast 2024 report to explore the latest trends on the horizon.
Have questions? Let's talk.
Mandiant experts are ready to answer your questions.