MandiantOvjeren akaunt

@Mandiant

Responding to the most critical cybersecurity incidents & empowering orgs to protect their assets. A company.

Alexandria, VA
Vrijeme pridruživanja: travanj 2009.

Tweetovi

Blokirali ste korisnika/cu @Mandiant

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Mandiant

  1. ., Solutions Architect will be joining a panel of experts with backgrounds in threat research and intelligence at to discuss how he views the and how he prioritizes security. >> More info:

    Poništi
  2. 4. velj

    There are still some open spots in our online course that begins this Thursday! Learn about the entire forensics process and investigations for :

    Poništi
  3. 4. velj

    See how cyber can help improve computer operations as we discuss a case study that examines the intelligence linked to recent Iranian geopolitical events. Register for the webinar:

    Poništi
  4. 3. velj

    Join Daniel Kapellmann Zafra at for his talk on that analyzes the problem from both an and and OT perspective. >> Learn more:

    Poništi
  5. 3. velj

    We'll have a hands-on lab environment for our upcoming course on alert analysis where you'll conduct in-depth analysis on the behavior and attributes of . >> Register:

    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  7. 31. sij

    Discover how you can take real-world scenarios and alerts to triage & derive actionable information from your alerts on FireEye . >> Sign-up:

    Poništi
  8. 31. sij

    Join our webinar as we explore the intelligence tied to recent Iranian geopolitical events and demonstrate how operators can pivot from intelligence reporting to high confidence alerting and targeted . >> Register:

    Poništi
  9. 30. sij

    Need help planning out your experience at ? Find out where you can catch all of our speakers:

    Poništi
  10. 30. sij

    Find out how you can effectively operationalize cyber on Iranian groups' methodologies while using the ATT&CK framework. >> Read:

    Poništi
  11. 30. sij

    Join us for hands-on activities that will span the entire forensic process, beginning with an alert. >> Sign-up:

    Poništi
  12. 29. sij

    Hey analysts! Brush up on FireEye so you can triage and derive meaningful, actionable information from your alerts. Register for the online course:

    Poništi
  13. 28. sij

    Participate in hands-on activities that span the entire forensics process, starting with an alert and leading to discovery & analysis of the host for evidence of . >> Register:

    Poništi
  14. 28. sij

    Analysts can learn to triage and derive meaningful, actionable information from alerts on FireEye . Sign up for the online course:

    Poništi
  15. 27. sij

    Learn the fundamentals of live analysis forensics and investigation for . Sign-up for the online course:

    Poništi
  16. 27. sij

    We continue to actively track multiple clusters of activity associated with the exploitation of the CVE-2019-19781 vulnerability. Recent compromises suggest it's being used to deploy . >> Learn more:

    Poništi
  17. 24. sij

    The American Herald Tribune claims it is a “genuinely independent online media outlet”, but it doesn’t seem to be. spoke to about its ties to an Iranian influence operation. via

    Poništi
  18. proslijedio/la je Tweet
    24. sij

    The CVE-2019-19781 train continues. This time, we highlight a financially-motivated threat actor attempting to push ransomware via exploited Citrix and EternaBlue. Combo vulnerabilities != fun. Luckily - they didn't get far. Nice try.

    Prikaži ovu nit
    Poništi
  19. 24. sij

    Listen to this segment with Sandra Joyce, Senior VP of Global Intelligence where she discusses Iranian impersonation campaigns and how the U.S. needs to be on alert for from foreign countries leading up to the .

    Poništi
  20. 24. sij

    Join us for a hands-on lab environment training course where you'll learn how to handle real-world scenarios and conduct in-depth analysis to assess threats. >> Register:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·