M-Trends 2024 Special Report

Published on: 
May 1, 2024

In this 15th edition, M-Trends provides an inside look at the evolving cyber threat landscape, with data drawn directly from frontline incident response investigations and threat intelligence findings of high-impact attacks and remediations around the globe.

  • The latest incident response metrics including dwell times, detection sources, initial infection vectors, and so much more
  • China-nexus attackers increasingly targeting edge devices and platforms that lack EDR
  • Trending adversary operations and motivations behind zero day attacks
  • The evolution of phishing techniques amidst modern security controls
  • How attackers are leveraging AiTM to compromise multi-factor authentication safeguards
  • The reasons and solutions behind growing cloud and hybrid cloud environment intrusions
  • How AI is effectively used in red and purple team operations to help boost cyber defenses

Read Anton Chavakin's take on the report: https://medium.com/anton-on-security/reading-the-mandiant-m-trends-2024-acb3208add80

Related Content

Research
MOIS Linked MOIST GRASSHOPPER / Homeland Justice / KarmaBelow80 / Handala Hackers / Campaigns and Evolution

Explore the evolution of MOIS-linked actors Homeland Justice, Karma, and Handala. Analysis of destructive malware, surveillance integration, and the 2026 Stryker incident.

Learn More
Research
Handala: MOIS Linked Cyber Influence Ecosystem Threat Intelligence Assessment

Discover how Handala, Homeland Justice, and Karma function as a unified MOIS-linked cyber influence ecosystem. This threat intelligence assessment reveals how Iran uses "hack-and-leak" operations to weaponize perception over technical complexity.

Learn More
Research
DPRK Malware Modularity: Diversity and Functional Specialization

Explore the DPRK’s modular malware architecture. Analyze how North Korea uses compartmentalized toolchains for espionage, crypto theft, and strategic signaling.

Learn More