Mandiant responds to numerous breaches every year, and 2015 was no different. We also track the most sophisticated threat actors, and have done so for more than 10 years. This combined experience has provided us unique insight into the world of cybercrime and the ever-changing threat landscape.
To share what we have been seeing throughout this past year, we present “M-Trends 2016.”
In this seventh edition of our report, we discuss our annual metrics that readers have to come expect, as well as trends involving disruptive attacks, the targeting of personally identifiable information (PII) in bulk by Chinese threat actors, and the compromise of enterprise networking devices as part of targeted and persistent campaigns.
We also discuss two trends that we see year after year, as part of our “Trends Turned Constants” section. One involves leveraging third-party service providers to gain access to victim organizations. The other involves Windows persistence, and exploring some new and creative mechanisms that we have discovered. Additionally, we included features about Red Team operations and how our FireEye as a Service (FaaS) experts are keeping companies safer. Download the 2016 M-Trends Report.
Register for the Free Webinar!
M-Trends: The State of Cyber Attacks Webinar
Thursday, March 10, 11am ET/8 am PT
Join our webinar where Marshall Heilman, VP & Executive Director of Incident Response, speaks about 2015 cyber threat trends from Mandiant investigations across 30 industries.