Plattform
Darktrace ActiveAI Security Platform™
Erkennen Sie neuartige Bedrohungen in Ihrem gesamten Unternehmen.
Plattform-Produkte
Plattformübergreifende Produkte
KI-Untersuchungen
/ NETWORK

Proaktiver Schutz

/ EMAIL

Cloud-native KI-Sicherheit

/ CLOUD

Komplette Cloud Sicherheit

/ SECURE AI NEW

Deploy agents confidently

/ OT

Umfassende OT-Sicherheit

/ IDENTITY

360º-Benutzerschutz

/ ENDPOINT

Abdeckung für jedes Gerät

/ Proactive Exposure Management
/ Adaptive Human Defense
/ Attack Surface Management
/ Forensic Acquisition & Investigation
/ Incident Readiness & Recovery
/ Cyber AI Analyst

Accelerate triage by 10x

Mehr
Services

Verteidigen Sie mit Zuversicht

Integrations

Integrationsmöglichkeiten

Use Cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
APTs
Phishing
Data Loss
Account Takeover
Insider Threats
Supply Chain Attacks
Business Email Compromise
Customer stories
See how we solve problems for our 10,000+ customers
Inside the SOC
Technical deep dives of cyber incidents and the latest threat trends
Gründe für Darktrace
Der Darktrace-Unterschied
Unser Unternehmen
Inside Darktrace
Unsere KI
Unsere Kunden
Anerkennung in der Branche
Über uns
Events
Neuigkeiten
Unternehmensführung
Karrieren
Kontakt
Federal
Trust Center

Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for NDR

Darktrace LIVE: Secure AI, Unlock Innovation
Coming to a city near you | Register now →
Partner
Darktrace-Partner
Cloud-Partnerschaften
Inside Darktrace
Überblick
Technologiepartner
Partner Portal
Microsoft
AWS

Discover the value a partnership with Darktrace can bring to you and your customers, as we fundamentally transform your ability to reduce cyber disruption.

Ressourcen
Blogs
Weitere Ressourcen
Ausgewählte Ressource
The Darktrace Blog

Aktuelle Sicherheitstrends und Tipps

Inside the SOC

Echte Bedrohungen in realen Umgebungen

Ressourcenbibliothek

Bedrohungsberichte, CISO-Anleitungen und mehr

Kundenberichte

10.000 Organisationen aller Größen

Cyber AI Glossary

Ein A-Z in Sachen Cyber

Uncover findings from our survey of 1500 cybersecurity professionals on how AI is shaping concerns and priorities

Securing AI in the Enterprise
Take the next step toward securing AI in your environment.
Get a demo
Platform
/ NETWORK

Proactive protection

/ EMAIL

Cloud-native AI security

/ CLOUD

Complete cloud coverage

/ SECURE AI

Deploy agents confidently

/ OT

Comprehensive risk management

/ IDENTITY

360º user protection

/ ENDPOINT

Coverage for every device

/ Proactive Exposure Management
/ Adaptive Human Defense
/ Attack Surface Management
/ Forensic Acquisition & Investigation
/ Incident Readiness & Recovery
/ Cyber AI Analyst

Accelerate triage by 10x

Services

Defend with confidence

Integrations

Connect with anything

Darktrace ActiveAI Security Platform™
Spot novel threats across your whole organization.
Solutions
Use cases
Ransomware
Account Takeover
APTs
Insider Threats
Phishing
Supply Chain Attacks
Data Loss
Business Email Compromise
Inside the SOC
Technical deep dives of cyber incidents and the latest threat trends
Why Darktrace
The Darktrace Difference
Our AI
Our Customers
Industry Recognition
About Us
Company
Events
News
Leadership
Careers
Contact Us
Federal
Trust Center
Darktrace LIVE
Coming to a city near you | Register now →
Partners
Darktrace Partners
Overview
Technology Partners
Partner Portal
Further Partners
Microsoft
AWS
Darktrace Partner Portal
Stronger Together: Defend, Disrupt, Deliver
Resources
Blogs
The Darktrace Blog
Inside the SOC
The Inference
Further Resources
Resource Library
Customer Stories
Cyber AI Glossary
Securing AI in the Enterprise
Take the next step
Get a demo

The Darktrace Blog

Stay ahead of today’s cyber threats

Expert insights and practical guidance to help you strengthen your organization’s cybersecurity in the modern era.

Network
Written by:
Joanna Ng
|
Apr 21, 2026

How a Compromised eScan Update Enabled Multi‑Stage Malware and Blockchain C2

A malicious eScan software update triggered a supply chain compromise that deployed multi‑stage malware and used blockchain‑based domains for resilient C2 communications. Darktrace identified rare, anomalous network activity across customer environments, helping organizations uncover the attack chain and strengthen defenses against increasingly sophisticated supply chain threats.
Read more
Written by:
Ed Jennings
|
Apr 16, 2026

Why Behavioral AI Is the Answer to Mythos

Read more
OT
Written by:
|
Apr 16, 2026

Inside ZionSiphon: Darktrace’s Analysis of OT Malware Targeting Israeli Water Systems

Read more
Written by:
Shanita Sojan
|
Apr 13, 2026

7 MCP Risks CISO’s Should Consider and How to Prepare

Read more

Most read

Network

Campaign Trail

Written by:
Nathaniel Jones
|
Oct 20, 2025

Salty Much: Darktrace’s view on a recent Salt Typhoon intrusion

Read now

Campaign Trail

Written by:
Tara Gould
|
Jul 10, 2025

Crypto Wallets Continue to be Drained in Elaborate Social Media Scam

Read now
Proactive Security

Industry Insights

Written by:
Nathaniel Jones
|
Jul 2, 2025

Pre-CVE Threat Detection: 10 Examples Identifying Malicious Activity Prior to Public Disclosure of a Vulnerability

Read now

Inside the SOC:
Threat research and real incident analysis

A series exclusively authored by Darktrace’s expert cyber analysts, featuring
technical deep dives into cyber incidents and the latest threat trends.

Nathaniel Bill
|
Apr 7, 2026
Darktrace Identifies New Chaos Malware Variant Exploiting Misconfigurations in the Cloud
Read more
Isabel Evans
|
Mar 26, 2026
Phantom Footprints: Tracking GhostSocks Malware
Read more
Tiana Kelly
|
Mar 17, 2026
When Reality Diverges from the Playbook: Darktrace Identifies Encryption in a World Leaks Ransomware Attack
Read more
Go Inside the SOC
Newsletter

Stay ahead of threats with the Darktrace blog newsletter

Get the latest insights from the cybersecurity landscape, including threat trends, incident analysis, and the latest Darktrace product developments – delivered directly to your inbox, monthly.

Browse all blogs

Cybersecurity insights for security leaders who can’t afford blind spots.

Topics
Industry
Written by:
The Darktrace Threat Research Team
|
Aug 6th, 2024

Darktrace Releases 2024 Half-Year Threat Insights

Email
Written by:
Carlos Gray
|
Aug 2nd, 2024

Safelink Smuggling: Enhancing Resilience Against Malicious Links

Written by:
Adam Stevens
|
Jul 31st, 2024

CDR is just NDR for the Cloud... Right?

Inside the SOC
Written by:
Justin Torres
|
Jul 26th, 2024

Understanding the WarmCookie Backdoor Threat

Written by:
The Darktrace Community
|
Jul 24th, 2024

The State of AI in Cybersecurity: Understanding AI Technologies

Inside the SOC
Written by:
Nahisha Nobregas
|
Jul 18th, 2024

Investigating the Adaptive Jupyter Information Stealer

Inside the SOC
Written by:
Nate Bill
|
Jul 17th, 2024

WARPscan: Cloudflare WARP Abused to Hijack Cloud Services

Compliance
Written by:
Kendra Gonzalez Duran
|
Jul 17th, 2024

What you need to know about the new SEC Cybersecurity rules

Inside the SOC
Written by:
Tara Gould
|
Jul 11th, 2024

GuLoader: Evolving Tactics in Latest Campaign Targeting European Industry

Previous
Show more
22 / 62
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Compliance

Our compliance certifications are also recognized

Get a demo

Featured resource

The State of AI Cybersecurity 2026: Executive Summary

Annual Threat Report 2025

The AI Arsenal: Understanding the Tools Shaping Cybersecurity

Your data. Our AI.
Elevate your cybersecurity with Darktrace AI
Get a demo

Gartner, Voice of the Customer for Network Detection and Response, By Peer Community Contributor, 30 October 2025 Gartner, Magic Quadrant for Network Detection and Response, By Thomas Lintemuth, Esraa ElTahawy, John Collins, Charanpal Bhogal, Nahim Fazal, 29 May 2025
‍
Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose. The GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved.
‍
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Darktrace. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Magic Quadrant and Peer Insights are registered trademarks of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved.

Deutsch
English
Française
Deutsch
Español
日本語
English
Française
Deutsch
Español
日本語
Produkte
Produkte im Überblick
Plattform
/NETWORK
/EMAIL
/CLOUD
/ SECURE AI
/OT
/IDENTITY
/ENDPOINT
Plattform-Add-Ons
/ Proactive Exposure Management
/ Attack Surface Management
/ Forensic Acquisition & Investigation
/ Incident Readiness & Recovery
Dienstleistungen
Überblick
Firma
Über uns
Kontakt
Neuigkeiten
Führung
Investoren
Karriere
Akademie
Akademie
föderal
Trust Center
Rechtliches
Übernahme von Thoma Bravo
Unsere KI
Cyber-KI
KI-Forschungszentrum
Ressourcen
Alle Ressourcen
Blog
Kunden
Kundenportal
Ereignisse
Die Inferenz
Im SOC
Glossar
Partner
Überblick über unsere Partner
Technologiepartner
Integrationen
Partnerportal
DatenschutzrichtlinieCookie-RichtlinieErklärung zum Gesetz über moderne SklavereiÖffentliche SteuerstrategieRichtlinie zur Offenlegung von Sicherheitslücken
Copyright 2025 Darktrace Holdings Limited. Alle Rechte vorbehalten.