/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@mandiant

@mandiant
25 posts
2026-03-04
Coruna exploit kit is targeting iOS. Coruna leverages 23 exploits against Apple devices running iOS 13-17.2.1. It is being used for espionage, and by financially motivated actors to steal crypto. Update your iOS devices, and learn more about this threat: https://cloud.google.com/... [image]
2026-03-04 View on X
Wired

Google details Coruna, an exploit kit used to hijack iPhones via malicious websites; iVerify suggests it may have been originally built for the US government

A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more.

2026-01-29
Google & partners disrupted IPIDEA, one of the world's largest residential proxy networks, reducing its device pool by millions. This infrastructure was leveraged by over 550 distinct espionage and cybercrime groups. Full report + IOCs here: https://cloud.google.com/... [image]
2026-01-29 View on X
Wall Street Journal

Google says it took legal action to take down dozens of domains and disrupt the residential proxy network of Chinese company Ipidea, widely used by bad actors

Company targets global network employed by hackers that often use devices running in homes of everyday Americans

2025-10-18
North Korea threat actor UNC5342 is using EtherHiding, the first time we have observed a nation-state use this technique. 🚨 The TTP is being used in a social engineering campaign that leads to cryptocurrency heists and espionage. Read the blog post: https://cloud.google.com/... [image]
2025-10-18 View on X
BleepingComputer

Google says North Korea hackers are using “EtherHiding” to embed malware on blockchains, the first time it has seen a nation-state threat actor using the method

North Korean hackers have adopted the ‘EtherHiding’ technique that leverages smart contracts to host and deliver malware …

2025-07-17
A financially motivated threat actor, #UNC6148, is targeting fully patched, end-of-life SonicWall SMA 100 appliances. In this latest activity, they deploy a new persistent backdoor we track as OVERSTEP. 🔗 Full details and defensive recommendations: https://cloud.google.com/... [image]
2025-07-17 View on X
The Record

Google says threat actors are breaching fully patched, end-of-life cybersecurity company SonicWall's appliances and stealing sensitive data from organizations

Threat actors are stealing sensitive data from organizations by breaching end-of-life appliances made by cybersecurity company SonicWall.

2025-04-02
🚨 DPRK IT Workers Expanding! GTIG is seeing increased DPRK IT worker ops in Europe, confirming expansion beyond the U.S. Since our 2024 report, they've grown in scope and scale, with evolving tactics. Learn the risks: https://cloud.google.com/... [image]
2025-04-02 View on X
BleepingComputer

Google researchers say DPRK's IT workers are fraudulently securing remote roles at companies in Germany, Portugal, and the UK, after facing sanctions in the US

North Korea's IT workers have expanded operations beyond the United States and are now increasingly targeting organizations across Europe.

2024-10-24
🚨 Breaking: A zero-day vulnerability (CVE-2024-47575) has been observed impacting Fortinet FortiManager devices, posing serious risks. Learn how the exploit works, and how to defend against the threat. Read more -> https://cloud.google.com/... #ThreatIntelligence [image]
2024-10-24 View on X
BleepingComputer

Fortinet discloses a critical FortiManager API flaw being exploited in 0-day attacks to steal sensitive files, after warning customers privately over a week ago

Fortinet publicly disclosed today a critical FortiManager API vulnerability, tracked as CVE-2024-47575, that was exploited …

2024-07-27
APT45 is a long-running, North Korean cyber operator active since as early as 2009. #APT45 conducts espionage, but has expanded into financially-motivated operations, and has been observed targeting critical infrastructure. Read more: https://cloud.google.com/... [image]
2024-07-27 View on X
Associated Press

The US DOJ indicts a North Korean hacker, still at large, for his alleged role in the Andariel group's cyberattacks on US hospitals, NASA, and military bases

Associated Press :

2024-05-07
Google Threat Intelligence highlights the threats that matter to your organization right now. Tap into investigative learnings from Mandiant frontline experts, the VirusTotal intel community, and Google threat insight. Read the blog: https://cloud.google.com/... [image]
2024-05-07 View on X
CRN

Google Cloud unveils Google Threat Intelligence, which uses Gemini and combines insights from Mandiant, VirusTotal, and Google to provide faster protection

Launched at RSAC 2024, the new Google Threat Intelligence offering provides faster protection against threats by combining insights from Mandiant …

2023-08-18
“Like any technological innovation, we expect adversaries are going to find applications for AI tools. However, the promise is far greater for defenders, who have the ability to direct the development.” -@JumpforJoyce Read about AI in the cyber landscape: https://www.mandiant.com/...
2023-08-18 View on X
Reuters

Mandiant: the use of AI to conduct politically-motivated online influence campaigns has grown in recent years, but the impact of such campaigns has been limited

Google-owned U.S. cybersecurity firm Mandiant said on Thursday it had seen increasing use of artificial intelligence (AI) …

2023-06-03
On May 31, 2023, Progress Software Corporation announced a wide exploitation of zero-day vulnerability in the MOVEit Transfer secure managed file transfer software. Learn more here: https://www.mandiant.com/...
2023-06-03 View on X
BleepingComputer

Rapid7 and Mandiant: hackers are actively exploiting a zero-day vulnerability in Progress' MOVEit Transfer file transfer tool to steal data from organizations

Hackers are actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software, tracked as CVE-2023-34362, to steal data from organizations.

2023-03-03
Mandiant supports the private-public partnership model as outlined in the National Strategy to help resource-restricted sectors and entities defend themselves. We see this as an opportunity to better align our collective defense to the threats facing us. https://www.csis.org/...
2023-03-03 View on X
CyberScoop

The Biden administration issues a national cybersecurity strategy, seeking to impose minimum standards, shift responsibility to larger software makers, and more

CyberScoop :

2022-04-23
In 2021, Mandiant Threat Intelligence identified 80 #zerodays exploited in the wild, which is more than double the previous record volume in 2019. Read our latest blog post to learn more 👇 https://www.mandiant.com/...
2022-04-23 View on X
MIT Technology Review

Mandiant: one-third of all hacker groups exploiting zero-days in 2021 were financially motivated criminals as opposed to government-backed cyberespionage groups

Patrick Howell O'Neill / MIT Technology Review :

2022-04-22
In 2021, Mandiant Threat Intelligence identified 80 #zerodays exploited in the wild, which is more than double the previous record volume in 2019. Read our latest blog post to learn more 👇 https://www.mandiant.com/...
2022-04-22 View on X
MIT Technology Review

Mandiant: one-third of all hacker groups exploiting zero-days in 2021 were financially motivated criminals as opposed to government-backed cyberespionage groups

The most valuable hacking tools were once the domain of governments.  Not anymore.  —  Organized cybercriminals with money …

2022-04-14
We've published a blog post on our analysis of the INCONTROLLER framework, covering how new state-sponsored cyber attack tools target multiple industrial control systems. Thanks to @SchneiderElec & our partners for their contribution. Full post 👇 #ICS https://www.mandiant.com/...
2022-04-14 View on X
The Record

US government agencies warn of new custom tools, created by several APT actors, that are capable of compromising IT equipment used in critical infrastructure

Several advanced persistent threat (APT) actors have created custom-made tools designed to breach IT equipment used … Source: CISA .

2022-04-07
Today we announced our strategic partnership with @CrowdStrike, which brings the power of CrowdStrike's Falcon platform to Mandiant's industry-leading services helping to protect customers from #cyberthreats. Learn more. ⬇️ https://www.mandiant.com/...
2022-04-07 View on X
Washington Post

Mandiant and CrowdStrike partner to help customers investigate and mitigate threats; Mandiant will begin deploying CrowdStrike's tools

Joseph Menn / Washington Post :

2022-03-26
Charges against Russian officials targeting critical infrastructure back to 2012 come days after President Biden's warnings of potential cyber attacks from Moscow. One of these attacks, @JohnHultquist tells @NYTimes, signaled a leap in what was possible. https://www.nytimes.com/...
2022-03-26 View on X
New York Times

The DOJ charges four Russian officials for alleged hacking campaigns from 2012 to 2018 on critical US infrastructure, including a Kansas nuclear power plant

Saturday, March 26, 2022 // (IG): BB //Weekly Sponsor: DiyGarage SoCal Gary Warner / CyberCrime & Doing Time : Russia's Invasion of Ukraine and CISA/FBI's New Era of Transparency C...

2022-03-22
Cyber attacks took center stage prior to the invasion, but haven't been as key to Russia's offense as more traditional machines of war. @JohnHultquist talks to @Vice's @josephfcox about when and where cyber attacks are likely to be employed. https://www.vice.com/...
2022-03-22 View on X
The White House

The White House again warns that Russia may expand cyberattacks against the US, citing “evolving intelligence that the Russian Government is exploring options”

This is a critical moment to accelerate our work to improve domestic cybersecurity and bolster our national resilience.

2022-03-08
We are excited to announce that we've signed an agreement to join the @GoogleCloud family — bringing together some of the best minds in security! Read more here: https://www.mandiant.com/... https://twitter.com/...
2022-03-08 View on X
Mandiant

Google plans to acquire cybersecurity company Mandiant for around $5.4B, or $23 per share, with the deal closing later in 2022; Mandiant will join Google Cloud

Acquisition to bring Google speed and scale to Mandiant's unparalleled intelligence and expertise - at a time when security has never been more important

2021-11-17
Today, the Mandiant Threat Intelligence team shared that it assesses with high confidence that #UNC1151 is linked to the Belarusian govt & that Belarus is likely at least partially responsible for the Ghostwriter IO campaign. Read more on our blog: https://www.mandiant.com/...
2021-11-17 View on X
ZDNet

Cybersecurity firm Mandiant says it has “high confidence” that Belarus is partially responsible for Ghostwriter, a hack-and-leak operation in some EU states

Mandiant says the government is likely to blame for anti-NATO campaigns, and more.  —  The Belarusian government … Source: Mandiant .

2021-03-07
Earlier this week, @Microsoft shared #zeroday vulnerabilities used to attack on-prem versions of Microsoft Exchange Server. Managed Defense found multiple instances of abuse in at least one client environment starting in Jan. 2021. ▶️ Get the details: https://www.fireeye.com/... https://twitter.com/...
2021-03-07 View on X
Krebs on Security

Sources: at least 30K US organizations have been hacked by an aggressive Chinese espionage group exploiting unpatched flaws in Microsoft's Exchange Server

At least 30,000 organizations across the United States — including a significant number of small businesses, towns …