Texture Top Right Red 01

M-Trends Reports

M-Trends 2019

Insights into Today’s Breaches and Cyber Attacks

M-Trends, the annual publication based on FireEye Mandiant frontline investigations, reports on high-interest, significant cyber attacks across multiple industries and regions.

In 2018, the cyber security industry evolved in ways that were both expected and surprising.

Download the new M-Trends 2019 Report today for an intelligence-led look into:

  • Advanced persistent threat (APT) groups—how they’ve evolved in North Korea, Russia, China, and Iran over the past decade, and groups elevated to APT status in 2018
  • Why “once a target, always a target” is more true than ever
  • Hidden phishing risks during merger and acquisition (M&A) activities
  • Case studies with practical security lessons
  • New defensive practices developed on the frontlines of incident response
Texture Top Right Red 01

M-Trends Reports

M-Trends 2019

M-Trends 2019

Insights into Today’s Breaches and Cyber Attacks

M-Trends, the annual publication based on FireEye Mandiant frontline investigations, reports on high-interest, significant cyber attacks across multiple industries and regions.

In 2018, the cyber security industry evolved in ways that were both expected and surprising.

Reserve your copy of the new M-Trends 2019 Report today for an intelligence-led look into:

  • Advanced persistent threat (APT) groups—how they’ve evolved in North Korea, Russia, China, and Iran over the past decade, and groups elevated to APT status in 2018
  • Why “once a target, always a target” is more true than ever
  • Hidden phishing risks during merger and acquisition (M&A) activities
  • Case studies with practical security lessons
  • New defensive practices developed on the frontlines of incident response

Reserve your copy

Please enter your email address to receive a copy on March 4.

M-Trends Turns 10

A decade of cyber security investigations

Related resources

Previous reports

M-Trends 2018

An in-depth look at some of the latest trends identified through incident response investigations by FireEye Mandiant.

Download report

M-Trends 2018 Infographic

An in-depth look at some of the latest trends and statistics identified through incident response investigations by FireEye Mandiant.

Download report

M-Trends 2017

Explore the trends that define today’s threat landscape based on Mandiant’s investigation of the year’s successful breaches and cyber attacks.

Download report

M-Trends 2017 Infographic

Explore the trends and get statistics based on Mandiant’s investigation of the year’s successful breaches and cyber attacks across the globe.

Download infographic

M-Trends 2016

This report details the findings of our consultants, based on their experiences responding to incidents over the past year.

Download report

M-Trends 2016: APAC

This latest M-Trends report focuses exclusively on Asia Pacific organizations and details the 5 cyber security trends and observations.

Download report

M-Trends 2016: EMEA

Special report highlighting statistics, trends and lessons learned from data breach investigations in Europe, Middle East and Africa.

Download report

M-Trends 2015

Annual threat report uses insights, statistics, and case studies to show how tools and tactics of advanced persistent threat (APT) actors have evolved.

Download report

M-Trends 2014

Annual threat report that describes newer global threat actors, their suspected motives, and their types of targets and objectives.

Download report

M-Trends 2013

Annual threat report that reviews targeted attacks to reveal evolving trends, case studies and best practices.

Download report

M-Trends 2012

Annual threat report that uses key insights, statistics and case studies to show how the tools and tactics of advanced cyber attackers evolved.

Download report

M-Trends 2011

Annual threat report that details how advanced persistent threat (APT) attacks successfully compromises targets.

Download report

M-Trends 2010

Annual threat report that provides threat intelligence gained through intrusion investigations for the U.S. government, the defense industrial base, and commercial organizations.

Download report