Showing page 1211 of 1220 of 1750 results.

Blog
Leaders need evidence that demonstrates security is working as intended; learn about how security validation can reduce risk, prove effectiveness and improve ROI.
Blog
An important starting point for the budget conversation is to understand how well or poorly a company is currently managing its security, and that's where validation can help.
Blog
XDR solutions such as Mandiant Automated Defense help protect the IT systems government agencies depend on to carry out operations and process data.
Blog
With today’s announcement of the sale of the FireEye Products business to Symphony Technology Group (STG), we have taken an important step forward to help us better serve our customers and accelerate strategies that are defining the future of cyber security.
Blog
Breach and Attack Simulation is not enough to demonstrate cyber readiness, but Mandiant Security Validation can help get it done by safely emulating real attacks.
Blog
This blog post shines a heat lamp on the latest tradecraft of UNC2198, who,  , used ICEDID infections to deploy MAZE or EGREGOR ransomware.
Blog
Mandiant uncovered and publicly disclosed a widespread attacker campaign that is being tracked as UNC2452 . In some, but not all, of the intrusions associated with this campaign where Mandiant has visibility, the attacker used their access to on-premises networks to gain unauthorized access to the victim’s Microsoft 365 environment. Learn more about the techniques used by UNC2452, as well as an auditing script to check for indicators of some of these techniques.
Blog
In this blog post we discuss how Speakeasy can be effective at automatically identifying rootkit activity from the kernel mode binary.
Blog
A state-sponsored adversary stole FireEye Red Team tools, so we are releasing hundreds of countermeasures to ensure the security community is protected.
Blog
Mandiant Threat Intelligence has tracked several loader and backdoor campaigns that lead to the post-compromise deployment of ransomware.