Beginning in January 2021, Mandiant Managed Defense observed multiple instances of abuse of Microsoft Exchange Server within at least one client environment. The observed activity included creation...
Read moreBeginning in January 2021, Mandiant Managed Defense observed multiple instances of abuse of Microsoft Exchange Server within at least one client environment. The observed activity included creation...
Read moreCOOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
August 11 2020During a recent investigation at a telecommunications company led by Mandiant Managed Defense, our team was tasked with rapidly identifying systems that...
Read moreCOOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
August 11 2020During a recent investigation at a telecommunications company led by Mandiant Managed Defense, our team was tasked with rapidly identifying systems that...
Read moreCOOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
August 11 2020During a recent investigation at a telecommunications company led by Mandiant Managed Defense, our team was tasked with rapidly identifying systems that...
Read moreCOOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
August 11 2020During a recent investigation at a telecommunications company led by Mandiant Managed Defense, our team was tasked with rapidly identifying systems that...
Read moreWhen we discover new intrusions, we ask ourselves questions that will help us understand the totality of the activity set. How common is this activity? Is there anything...
Read moreWhen we discover new intrusions, we ask ourselves questions that will help us understand the totality of the activity set. How common is this activity? Is there anything...
Read moreWhen we discover new intrusions, we ask ourselves questions that will help us understand the totality of the activity set. How common is this activity? Is there anything...
Read moreWhen we discover new intrusions, we ask ourselves questions that will help us understand the totality of the activity set. How common is this activity? Is there anything...
Read more
Recent Comments