Wednesday, 12 April 2017

Mandiant Threat Intelligence Reports

On a recent flight, I read Mandiant's 2013 report on APT1. Mandiant, which is now a division of FireEye, has produced a bunch of similar threat intelligence reports. I'm basically posting this list to make it easier for me to download a bunch of their stuff, but it may be of some interest to other folks.

  • A daily grind: Filtering Java vulnerabilities
  • APT1: Exposing one of China's cyber espionage units
  • APT1: Digital appendix and indicators
  • APT28: A Window Into Russia's Cyber Espionage Operations?
  • Brewing up trouble: Analyzing four widely exploited Java vulnerabilities
  • Digital bread crumbs: Seven clues to identifying who's behind advanced cyber attacks
  • DLL Side-loading: A thorn in the side of the anti-virus industry
  • Hot knives through butter: Evading file-based sandboxes
  • IANS Data Compromise Awareness
  • Investigating PowerShell attacks
  • Leviathan: Command and control communications on planet Earth
  • NIST: Best Practices in Cyber Security Chain Risk Management
  • Operation “Ke3chang”: Targeted attacks against ministries of foreign affairs
  • Operation Saffron Rose
  • Poison Ivy: Assessing damage and extracting intelligence
  • Red Line Drawn: China recalculates its use of cyber espionage
  • Sidewinder Targeted Attack against Android in the golden age of ad libraries
  • Supply chain analysis: From quartermaster to sunshop
  • The Little Malware That Could: Detecting and defeating the China Chopper Web Shell
  • Top words used in spear phishing attacks
  • Windows Management Instrumentation (WMI) offense, defense, and forensics

    The Joshua Tree Report is coming, I promise.
  • No comments:

    Post a Comment