Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile
Mandiant (part of Google Cloud)

@mandiant

We’re determined to make organizations secure against cyber threats and confident in their readiness.

ID: 30680268

calendar_today12-04-2009 17:01:05

9,9K Tweet

126,126K Followers

4,4K Following

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

🚨 APT41 is using malware, TOUGHPROGRESS, that leverages Google Calendar for command and control. Learn more about the campaign, how GTIG disrupted it using custom detection signatures, and how to defend against future attacks: bit.ly/4kCNqU1

🚨 APT41 is using malware, TOUGHPROGRESS, that leverages Google Calendar for command and control.

Learn more about the campaign, how GTIG disrupted it using custom detection signatures, and how to defend against future attacks: bit.ly/4kCNqU1
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

North Korean IT workers operating inside your org? Hear how incident responders uncovered the threat and what to watch for. 🎧 Watch the clip + catch the full episode → spoti.fi/451egke

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

75 zero-days were exploited in 2024. 🚨 GTIG’s latest report shows attackers are focusing more on enterprise tech, including security and networking products. View the full report for implications and recommendations for defenders: bit.ly/4dFZcuv

75 zero-days were exploited in 2024. 🚨

GTIG’s latest report shows attackers are focusing more on enterprise tech, including security and networking products.

View the full report for implications and recommendations for defenders: bit.ly/4dFZcuv
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

The true danger of “Rogue RDP” lies in the con, not the code. 👤 GTIG observed a phishing campaign targeting European government organizations by using signed .rdp attachments to establish Remote Desktop Protocol connections. Learn more ➡️ bit.ly/450MtR5

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

🚨 DPRK IT workers are expanding into Europe, using remote work covers to generate revenue for the regime. Is your team ready? Learn more: bit.ly/3Ssw3JC

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

The future of AI is agentic. These #AI agents will reason, act, & complete complex tasks autonomously. Huge potential, but we need strong governance, cybersecurity, & data protection. Learn more here: bit.ly/3FCYTUL

The future of AI is agentic. These #AI agents will reason, act, & complete complex tasks autonomously. Huge potential, but we need strong governance, cybersecurity, & data protection. 

Learn more here: bit.ly/3FCYTUL
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Nation-state threats are rising 📈 Our new white paper, "Securing Nations in the Digital Age: Google Cloud Cybershield™️,” outlines how governments can build stronger cyber defenses with actionable insights and capabilities. Learn more: bit.ly/4mLJty6

Nation-state threats are rising 📈

Our new white paper, "Securing Nations in the Digital Age: Google Cloud Cybershield™️,” outlines how governments can build stronger cyber defenses with actionable insights and capabilities.

Learn more: bit.ly/4mLJty6
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Organizations, are you prepared for voice phishing?📱 UNC6040 is a financially-motivated threat cluster that specializes in using voice phishing (vishing) to compromise organizations' Salesforce instances, leading to large-scale data theft. Learn more: bit.ly/3FxJwx1

Organizations, are you prepared for voice phishing?📱

UNC6040 is a financially-motivated threat cluster that specializes in using voice phishing (vishing) to compromise organizations' Salesforce instances, leading to large-scale data theft.

Learn more: bit.ly/3FxJwx1
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Voice phishing is getting more sophisticated — threat actors are crafting stories to get past defenses and steal sensitive data. ‼️ Read our analysis and learn how to defend your team. 🔗 goo.gle/3ZRadU2

Voice phishing is getting more sophisticated — threat actors are crafting stories to get past defenses and steal sensitive data. ‼️

Read our analysis and learn how to defend your team.

🔗 goo.gle/3ZRadU2
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

ICYMI: Ivanti disclosed a critical vulnerability in Connect Secure VPNs, actively exploited by UNC5221. 🔗 Full blog post: goo.gle/3Hth287

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

What goes into creating effective software protections? 🤔 In this Behind the Binary episode, emproof’s Tim Blazytko discusses the essential strategies for protecting software intellectual property & the evolution of protection techniques. 🎧: spoti.fi/43wtY5R

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

The threat of DPRK IT workers isn’t just in the U.S. — Google Threat Intelligence Group has identified an increase of active operations in Europe as well. 🌍 Security teams should be prepared for this emerging threat. Read the full blog for more: bit.ly/3Ftz7Cx

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Attackers take any opportunity to get in. The 2025 #MTrends Report contains data from our investigations, including stolen credentials as number two initial infection vector. Don’t miss the key takeaways and defense strategies. Read the full report: bit.ly/4jAMVZJ

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Join our Security Talks event on June 18 🎉 Hear from experts on Google Unified Security, #MTrends insights for your SOC, agentic #AI in #SecOps, tabletop to threat hunting, and more! Register today → bit.ly/4kXoMh7

Join our Security Talks event on June 18 🎉

Hear from experts on Google Unified Security, #MTrends insights for your SOC, agentic #AI in #SecOps, tabletop to threat hunting, and more!

Register today → bit.ly/4kXoMh7
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Immediate action required 🚨 Ivanti disclosed a critical security vulnerability impacting Connect Secure VPN appliances on April 3, 2025. Organizations are encouraged to apply the available patch to secure their systems as soon as possible. 🔗 bit.ly/4jP3S2O

Immediate action required 🚨 

Ivanti disclosed a critical security vulnerability impacting Connect Secure VPN appliances on April 3, 2025.

Organizations are encouraged to apply the available patch to secure their systems as soon as possible.

🔗 bit.ly/4jP3S2O
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Mark your 🗓️ for June 18! Explore new Google Unified Security, the latest 2025 M-Trends research, the future of agentic SOC, and more at the upcoming Security Talks. Register today → bit.ly/4kWIZ6F

Mark your 🗓️ for June 18! 

Explore new Google Unified Security, the latest 2025 M-Trends research, the future of agentic SOC, and more at the upcoming Security Talks.

Register today → bit.ly/4kWIZ6F
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

44% of 2024 zero-day exploitation targeted enterprise technologies, a steady increase over the 37% last year. Google Threat Intelligence Group breaks down which technologies are being targeted in attacks involving zero-days. Read the report: bit.ly/4e89oMU

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

In the latest zero-day analysis, Google Threat Intelligence Group tracked 75 exploited vulnerabilities in 2024. See who’s behind the attacks and their motivations. 🔗 Learn more: bit.ly/3FEMpfD

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Building on our latest #voicephishing research, Mandiant experts share how #AI voice cloning is changing social engineering. Listen to the full episode and get expert insights from the frontline: goo.gle/40aATzl