Showing page 341 of 350 of 376 results.

Webinaradvanced persistent threats
At the end of 2020, FireEye revealed the details of a sophisticated threat actor that took advantage of SolarWinds’ Orion Platform to orchestrate a wide-scale supply chain attack and deploy a backdoor we call SUNBURST.
Blogadvanced persistent threats
Robust Cyber Defenses are needed to prevent compromise, reduce attack impact, and enable organizations to continue to operate in the face of threats. In a new book published by Mandiant,  https://experience.mandiant.com/defenders-advantage-landing-page/p/1?utm_source=mandiant.com&utm_medium=web, The Defender’s Advantage, , our intelligence and consulting experts lay out six critical functions of Cyber Defense and how to activate them against threat actors launching attacks in our own environments.
Webinaradvanced persistent threats
Ransomware, supply chain attacks and other threats don’t just affect IT networks. Operational Technology (OT), including Industrial Control Systems (ICS), are increasingly being targeted by attackers and nation state groups.
Webinaradvanced persistent threats
The latest M-Trends 2021 report is packed with data from Mandiant's frontline incident response experience and unparalleled threat intelligence into the most impactful breaches and attacker behaviors around the world. But there is a deeper story to be told.
Pageadvanced persistent threats
CrowdStrike and Mandiant share a common goal: to find and stop breaches. This partnership will enable organizations of all sizes to access the help they need when they need it to investigate, remediate and defend against sophisticated cyber security threats.
Ebookadvanced persistent threats
If you are relying on compliance-based security to manage your cyber risk, it is likely your team will be struggling to prioritize threats, operating in a reactive security posture that is difficult to protect from attack. Fortunately, there is another way.
Pageadvanced persistent threats
Splunk and Mandiant have partnered to deliver a formidable defense for customers to stay ahead of attackers and evolving threats. By combining Splunk’s powerful analytics, SOAR automation and massive scale with industry-leading Mandiant threat intelligence, incident response data, and innovative security validation technology, customers can:   Quickly identify and understand real-time relevant adversary activity  Validate their controls are effective and events are making it to Splunk ES  Ensure events have context to trigger appropriate alerts and response  Access Mandiant experts with the click of a button
Blogadvanced persistent threats
Malvertising occurs when an online advertising network knowingly or unknowingly serves up malicious advertisements on a website.  Malvertisements  are a type of “drive-by” threat that tend to result in users being infected with malware for simply visiting a website. The victims of this threat are often compromised when the malvertisement directs them to an exploit kit (EK) landing page. Depending on the applications running on the user’s system, the EK can successfully load malware into a system without user consent and without tipping the victim off that something suspicious is happening.
Partneradvanced persistent threats
Intel (API v2), Collects threat indicators and writes to an index suitable to support correlation searches, Security Validation, Return events generated security technologies that write events to the SIEM and that match Mandiant Security Validation actions
Reportadvanced persistent threats
There is a notable gap in the enterprise security programs today. Companies buy several tools and attempt to integrate these tools. Security validation is a platform that tests the efficacy and interconnectedness of security tools against the threats and tactics of an adversary.