{"id":47024,"date":"2022-06-07T19:55:00","date_gmt":"2022-06-07T19:55:00","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks"},"modified":"2022-06-07T19:55:00","modified_gmt":"2022-06-07T19:55:00","slug":"mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/","title":{"rendered":"Mandia: Keep &#8216;Shields Up&#8217; to Survive the Current Escalation of Cyberattacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb59b7f39a4093adf\/629fa5d5ad2bbb5f0f3afbea\/mandiant_SOPA_Images_Limited_Alamy_Stock_Photo.jpeg\" class=\"ff-og-image-inserted\"><\/div>\n<p>RSA CONFERENCE 2022 \u2013 San Francisco \u2013 Back in the early 2000s&nbsp;when Mandiant was a small consulting firm in Northern Virginia, Kevin Mandia typically worked on just one incident response (IR) case at a time. Today, Mandia&#8217;s&nbsp;team at the now IR&nbsp;giant Mandiant \u2013&nbsp;which Google is in the process of acquiring \u2013&nbsp;works on more than a half-dozen cases concurrently.<\/p>\n<p>The volume of attacks is growing, especially so over the past year, according to Mandia. In recent&nbsp;IR cases Mandiant has been investigating, zero-day attacks and pilfered credentials have become the weapon of choice to infiltrate an organization, overtaking phishing.<\/p>\n<p>&#8220;A lot of customers are saying, &#8216;How long do we have to have our Shields Up?'&#8221; he said, in reference to the Cybersecurity and Infrastructure Security Agency (CISA)&#8217;s current <a href=\"https:\/\/www.darkreading.com\/risk\/white-house-warns-of-evolving-intel-on-russian-cyberattacks\" target=\"_blank\" rel=\"noopener\">slogan for warning organizations<\/a>&nbsp;to operate at heightened alert amid increasing cyber threat activity. &#8220;I think you have to keep [them] up. That&#8217;s a lesson we&#8217;re learning this year,&#8221; Mandia said in an interview with Dark Reading this week. <\/p>\n<p>&#8220;The impact of a breach is so much graver now,&#8221; he said. Not only are ransomware and extortion getting more brazen and chaos-causing with public data leaks and digital blackmail, but cybercriminals are basically catching up with nation-states when it comes to exploiting expensive zero-day vulnerabilities in software, he said.<\/p>\n<p>&#8220;In the early days, zero days were the purview of governments. In 2017, you started to see criminal elements arming a zero day,&#8221; he said. Today, it&#8217;s close to a 60-40 split, with <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/mandia-alerted-nsa-on-fireeye-s-solarwinds-breach\">nation-states<\/a><br \/>\nstill leading in zero-day attacks but with criminals not far behind. &#8220;That came sooner than I thought,&#8221; Mandia&nbsp;added. &#8220;It just tells you how much money you can make hacking.&#8221;<\/p>\n<h2 class=\"regular-text\">Silver Lining<\/h2>\n<p>But if there&#8217;s a bit of good news, it&#8217;s that organizations calling on Mandiant for help with an incident are spotting their intrusions sooner: &#8220;We&#8217;re getting hired earlier in the breach process, and there&#8217;s less [attacker] dwell time,&#8221; he said.<\/p>\n<p>Specifically, Mandiant saw the amount of time attackers remained unnoticed on a victim&#8217;s network <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/exploits-supply-chain-compromises-comprise-over-half-of-initial-infections-leading-to-cyberattacks\">dropped to 21 days in 2021<\/a>, down from 24 days in 2020. That trend has been steady for the past four years in Mandiant&#8217;s IR cases. <\/p>\n<p>There&#8217;s also a sense of urgency now among&nbsp;cybercriminals to ensure they snag the valuable data or demand their ransom for stolen data, Mandia said. &#8220;I was told today that the time frame dwell time used to be that they had access for about seven days, and that&#8217;s coming down to four to five days now. That speed means it&#8217;s getting harder to monetize&#8221; and cybercriminals have to work faster and more publicly to make their money, he explained.<\/p>\n<p>And the stakes are higher than ever for CISOs trying to deter and deflect a big breach. &#8220;This is the hardest year to be a CISO,&#8221; he said. &#8220;Now you&#8217;re [also] protecting your people threatened online, your employees, your customers. It&#8217;s so much, and it&#8217;s an unfair fight with [mostly] no risk of repercussions for the bad guys.&#8221;<\/p>\n<p>The threat includes the recent wave of phony or impossible-to-prove public data leak claims by threat actors and other fraudsters attempting to&nbsp;shake down or defame&nbsp;a victim organization.&nbsp;<\/p>\n<p>&#8220;It&#8217;s impossible to prove a negative,&#8221; Mandia said of these phony breach declarations that emerge. And organizations are forced to investigate an intrusion that may not even have occurred.&nbsp;<\/p>\n<p>&#8220;It&#8217;s becoming more frequent,&#8221; he said of this latest form of pressure by cybercriminals. There&#8217;s nothing harder to respond to; something that&#8217;s public, the hacker is vocal and making claims. And a company can&#8217;t dispute them [at first] because they have to figure out the answers first. Those are terrible situations.&#8221;<\/p>\n<p>That hit close to home for Mandia because, while Dark Reading was interviewing him on Monday, Mandiant itself became the subject of a fake&nbsp;breach assertion by the LockBit ransomware gang, which posted on Twitter that&nbsp;it had hacked the IR company. The claim appears to have been retribution for a recent ransomware report by Mandiant.&nbsp;<\/p>\n<p>&#8220;Based on the data released, there are no indications that Mandiant data has been disclosed,&#8221; Mandiant said in <a href=\"https:\/\/twitter.com\/Mandiant\/status\/1534230187721859073\">a tweet today<\/a><br \/>\nabout the claims. &#8220;Rather the actor appears to be trying to disprove our June 2, 2022 research on UNC2165 and LockBit. We stand behind the findings of this research.&#8221;<\/p>\n<h2 class=\"regular-text\">Googling Mandiant<\/h2>\n<p>Meanwhile, Mandiant is preparing for the completion of its merger with Google.&nbsp;Google announced <a href=\"https:\/\/www.darkreading.com\/cloud\/google-to-buy-mandiant-aims-to-automate-security-response\">its intent to acquire Mandiant<\/a> in March for a whopping $5.4 billion, and Mandia at the time touted the merger as a way to build out Mandiant&#8217;s planned strategy of automating specific elements of the&nbsp;IR process. Google&#8217;s investment should accelerate that strategy.<\/p>\n<p>&#8220;You have to automate as much as you can,&#8221; Mandia told Dark Reading this week. Tasks such as detection, collecting artifacts, and log file analysis could be automated, he noted. But there still are parts of IR that remain human tasks, such as attribution and deep-dive forensic analysis.<\/p>\n<p>&#8220;If there&#8217;s ever a deepfake or false-flag operation, it will be a human that will [spot it],&#8221; Mandian said.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As Mandiant CEO Kevin Mandia&#8217;s company prepares to become part of Google, the incident response company continues to investigate many of the most critical cyber incidents.Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-47024","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mandia: Keep &#039;Shields Up&#039; to Survive the Current Escalation of Cyberattacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mandia: Keep &#039;Shields Up&#039; to Survive the Current Escalation of Cyberattacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-07T19:55:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb59b7f39a4093adf\/629fa5d5ad2bbb5f0f3afbea\/mandiant_SOPA_Images_Limited_Alamy_Stock_Photo.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Mandia: Keep &#8216;Shields Up&#8217; to Survive the Current Escalation of Cyberattacks\",\"datePublished\":\"2022-06-07T19:55:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/\"},\"wordCount\":887,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltb59b7f39a4093adf\\\/629fa5d5ad2bbb5f0f3afbea\\\/mandiant_SOPA_Images_Limited_Alamy_Stock_Photo.jpeg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/\",\"name\":\"Mandia: Keep 'Shields Up' to Survive the Current Escalation of Cyberattacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltb59b7f39a4093adf\\\/629fa5d5ad2bbb5f0f3afbea\\\/mandiant_SOPA_Images_Limited_Alamy_Stock_Photo.jpeg\",\"datePublished\":\"2022-06-07T19:55:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltb59b7f39a4093adf\\\/629fa5d5ad2bbb5f0f3afbea\\\/mandiant_SOPA_Images_Limited_Alamy_Stock_Photo.jpeg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltb59b7f39a4093adf\\\/629fa5d5ad2bbb5f0f3afbea\\\/mandiant_SOPA_Images_Limited_Alamy_Stock_Photo.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mandia: Keep &#8216;Shields Up&#8217; to Survive the Current Escalation of Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mandia: Keep 'Shields Up' to Survive the Current Escalation of Cyberattacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Mandia: Keep 'Shields Up' to Survive the Current Escalation of Cyberattacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-06-07T19:55:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb59b7f39a4093adf\/629fa5d5ad2bbb5f0f3afbea\/mandiant_SOPA_Images_Limited_Alamy_Stock_Photo.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Mandia: Keep &#8216;Shields Up&#8217; to Survive the Current Escalation of Cyberattacks","datePublished":"2022-06-07T19:55:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/"},"wordCount":887,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb59b7f39a4093adf\/629fa5d5ad2bbb5f0f3afbea\/mandiant_SOPA_Images_Limited_Alamy_Stock_Photo.jpeg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/","url":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/","name":"Mandia: Keep 'Shields Up' to Survive the Current Escalation of Cyberattacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb59b7f39a4093adf\/629fa5d5ad2bbb5f0f3afbea\/mandiant_SOPA_Images_Limited_Alamy_Stock_Photo.jpeg","datePublished":"2022-06-07T19:55:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb59b7f39a4093adf\/629fa5d5ad2bbb5f0f3afbea\/mandiant_SOPA_Images_Limited_Alamy_Stock_Photo.jpeg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb59b7f39a4093adf\/629fa5d5ad2bbb5f0f3afbea\/mandiant_SOPA_Images_Limited_Alamy_Stock_Photo.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/mandia-keep-shields-up-to-survive-the-current-escalation-of-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Mandia: Keep &#8216;Shields Up&#8217; to Survive the Current Escalation of Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47024"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47024\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}