Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plattform
Produkte
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Umfassendes Risikomanagement
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber-KI Analyst
Untersucht jeden Alarm wie ein Mensch Analyst, mit der Geschwindigkeit und dem Umfang von KI
Darktrace-Dienste
Maximieren Sie Ihre Sicherheitsinvestitionen mit rund um die Uhr verfügbarem Expertensupport und Störfallmanagement durch unser globales SOC-Team.
KI-Forschungszentrum
Ressourcen
Kunden
Blog
Ereignisse
Im SOC
Die Inferenz
Glossar
Alle Ressourcen
Weißbuch
Das KI-Arsenal: Die Tools verstehen, die die Cybersicherheit prägen
Firma
Karriere
Führung
Neuigkeiten
föderal
Investoren
Akademie
Rechtliches
SDR Academy
Über uns
Kontakt
Partner
Überblick
Partnerportal
Technologiepartner
Integrationen
Ausgewählte Partner
Microsoft
AWS
Produkte
Überblick
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Schützen Sie kritische Systeme
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/Proaktives Expositionsmanagement
/Verwaltung der Angriffsfläche
/Vorfallbereitschaft und Wiederherstellung
Cyber-KI Analyst
Dienstleistungen
KI-Forschungszentrum
Ressourcen
Alle Ressourcen
Kunden
Blog
Ereignisse
Die Inferenz
Im SOC
Glossar
Firma
Über uns
Kontakt
Karriere
Führung
Neuigkeiten
föderal
Akademie
SDR Academy
Rechtliches
Partner
Überblick
Partnerportal
Technologiepartner
Werden Sie ein Partner
Integrationen
Microsoft
AWS
McLaren
Holen Sie sich eine Demo
Demo anfordern
Get a demo
Darktrace Blog
Email
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Rhoncus aenean vel elit scelerisque mauris pellentesque. Sed cras ornare arcu dui vivamus arcu.
Latest Blog Posts
Exploring the Benefits and Risks of Third-Party Data Solutions
This blog discusses why companies use third-party data management for efficiency, global access, collaboration, and reliability, while also addressing security risks associated and best practices with third-party data management.
Stemming the Citrix Bleed Vulnerability with Darktrace’s ActiveAI Security Platform
This blog delves into Darktrace’s investigation into the exploitation of the Citrix Bleed vulnerability on the network of a customer in late 2023. Darktrace’s Self-Learning AI ensured the customer was well equipped to track the post-compromise activity and identify affected devices.
Strategies to Combat Microsoft Teams Phishing Attacks
Join us to learn about the risks of Microsoft Teams phishing and how to implement effective defenses to protect your organization.
Don’t Take the Bait: How Darktrace Keeps Microsoft Teams Phishing Attacks at Bay
In this blog we examine how Darktrace was able to detect and block malicious phishing emails sent via Microsoft Teams that were impersonating an international hotel chain.
Lost in Translation: Darktrace Blocks Non-English Phishing Campaign Concealing Hidden Payloads
This blog explores how Darktrace/Email was able to successfully identify a wave of phishing emails sent from addresses belonging to a major fast-food chain which were leveraged in a coordinated attack. Despite the use of non-English language emails and payloads hidden behind QR codes, Darktrace was able to detect the attack and block the phishing emails in the first instance.
The State of AI in Cybersecurity: The Impact of AI on Cybersecurity Solutions
Part 3: This blog discusses the impact of AI on cybersecurity solutions based on data from Darktrace’s State of AI Cybersecurity Report. Get the latest insights into the evolving challenges faced by organizations, the growing demand for skilled professionals, and the need for integrated security solutions by downloading the full report.
Exploitation of ConnectWise ScreenConnect Vulnerabilities
Uncover the tactics used to exploit ConnectWise vulnerabilities and strategies to protect your systems.
How Empowering End Users can Improve Your Email Security and Decrease the Burden on the SOC
Most email security solutions either assume end-user reporting is of poor quality, so don’t prioritize it, or triage every user-reported email equally without any attempt to improve long-term efficiency. This blog explores how Darktrace aims to improve user reporting from the ground up, reducing the 90% falsely reported phishing and decreasing the load on security teams.
The Rise of Alternative Access in Cloud Attacks
Understand the evolution of cloud-based attacks and the increasing use of alternative methods for initial access in cyber threats.
How Cactus Ransomware Was Detected and Stopped
Discover the tactics used to uncover a Cactus ransomware infection and the implications for cybersecurity defenses.
The State of AI in Cybersecurity: How AI will impact the cyber threat landscape in 2024
Part 2: This blog discusses the impact of AI on the cyber threat landscape based on data from Darktrace’s State of AI Cybersecurity Report. Get the latest insights into the evolving challenges faced by organizations, the growing demand for skilled professionals, and the need for integrated security solutions.
Sliver C2: How Darktrace Provided a Sliver of Hope
Learn how Darktrace is tackling the challenges posed by the Sliver C2 framework and what it means for modern cybersecurity defenses.
The State of AI in Cybersecurity: Unveiling Global Insights from 1,800 Security Practitioners
Part 1: This blog outlines Darktrace’s State of AI Cybersecurity research report, showing key findings from our global survey, covering the impacts AI has on the cyber threat landscape, cyber security solutions, and perceptions and priorities for security practitioners.
Moving Beyond XDR to Achieve True Cyber Resilience with Darktrace ActiveAI Security Platform
Announcing the new Darktrace ActiveAI Security Platform designed to transform security operations. This approach gives security teams unprecedented visibility across any area where Darktrace is deployed, including cloud, email, network, endpoints, and operational technology (OT).
Managing Risk Beyond CVE Scores With the Latest Innovations to Darktrace / OT
Announcing the launch of our new innovation to Darktrace/OT. This industry leading innovation for Darktrace/OT moves beyond CVE scores to redefine vulnerability management for critical infrastructure, tackling the full breadth of risks not limited by traditional controls.
Balada Injector: Darktrace’s Investigation into the Malware Exploiting WordPress Vulnerabilities
This blog explores Darktrace’s detection of Balada Injector, a malware known to exploit vulnerabilities in WordPress to gain unauthorized access to networks. Darktrace was able to define numerous use-cases within customer environments which followed previously identified patterns of activity spikes across multiple weeks.
Looking Beyond Secure Email Gateways with the Latest Innovations to Darktrace / EMAIL
In 2024, email security challenges have evolved far beyond inbound attacks, as cyber attackers increasingly leverage AI and employ multi-vector techniques that penetrate every facet of organizational communication. Read how the largest ever update to Darktrace / EMAIL introduces new innovations designed to address the nature of modern email threats.
Darktrace's Investigation of Raspberry Robin Worm
Discover how Darktrace is leading the hunt for Raspberry Robin. Explore early insights and strategies in the battle against cyber threats.
Enhancing Cloud Security with Business Context
Discover cloud migration insights, security challenges, best practices, and Darktrace's unique approach to enhancing cloud visibility and risk management.
What are Botnets and How Darktrace Uncovers Them
Learn how Darktrace detected and implemented defense protocols against Socks5Systemz botnet before any threat to intelligence had been published.
Previous
Next