Dynamically Instrumenting Beacon With BeaconGate – For All Your Call Stack Spoofing Needs! Cobalt Strike Blog
Multiple CVEs in Infoblox NetMRI: RCE, Auth Bypass, SQLi, and File Read Vulnerabilities Rhino Security Labs
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors Mandiant Threat Intelligence
Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape Mandiant Threat Intelligence
Proactive Preparation and Hardening Against Destructive Attacks: 2026 Edition Mandiant Threat Intelligence