Blog Archive

Tuesday March 12, 2019
A security analyst’s view: Detecting and investigating lateral movement with Darktrace
Tyler Fornes, Senior Security Analyst at Expel (Guest Contributor)
Friday March 8, 2019
How state-sponsored attackers took colleges to school
Max Heinemeyer, Director of Threat Hunting at Darktrace
Tuesday March 5, 2019
Solving the “VR Goldilocks Problem” in Security Operations
Jon Hawes, Head of Detect and Security Innovation at Photobox Group Security, and Max Heinemeyer, Director of Threat Hunting at Darktrace
Friday February 15, 2019
Catching Mimikatz’ behavior with anomaly detection
Max Heinemeyer, Director of Threat Hunting
Friday February 8, 2019
AI reveals 2018’s biggest cyber-threats: Part two — to err is human
Max Heinemeyer, Director of Threat Hunting
Monday February 4, 2019
Anatomy of a zero-day trojan caught by our Darktrace appliance
Keith Siepel, IT Manager at Hydrotech, Inc. (Guest Contributor)
Monday January 28, 2019
AI reveals 2018’s biggest cyber-threats: Part one — the rise of nontraditional IT
Max Heinemeyer, Director of Threat Hunting
Thursday January 10, 2019
Glimpsing inside the trojan horse: An insider analysis of Emotet
Max Heinemeyer, Director of Threat Hunting
Monday December 3, 2018
Flying under the radar: How Darktrace detects ‘low and slow’ cyber-attacks
Dave Palmer, Director of Technology
Thursday November 22, 2018
Here’s how black hats will spend Black Friday
Justin Fier, Director of Cyber Intelligence & Analytics
Thursday October 25, 2018
Law and disorder: Firms in the firing line
Max Heinemeyer, Director of Threat Hunting
Thursday October 4, 2018
Troubled waters: Cyber-attacks on San Diego and Barcelona’s ports
Andrew Tsonchev, Director of Technology, Darktrace Industrial
Monday August 20, 2018
Healthcare beware: Crypto-mining, malware, and IoT attacks
Dave Palmer, Director of Technology, Darktrace
Monday July 16, 2018
Trusting the cloud: Unencrypted data upload by government body
Max Heinemeyer, Director of Threat Hunting
Friday June 22, 2018
Beyond the hash: How unsupervised machine learning unlocks the true power of JA3
Max Heinemeyer, Director of Threat Hunting
Monday April 16, 2018
How profitable is crypto-mining malware?
Max Heinemeyer, Director of Threat Hunting
Wednesday March 7, 2018
How malware abused Sixt.com and Breitling.com for covert Command & Control communication
Max Heinemeyer, Director of Threat Hunting
Tuesday February 13, 2018
Cryptocurrencies and the future of cyber defense
Max Heinemeyer, Director of Threat Hunting
Friday February 2, 2018
Machine vs machine: instant domain fluxing identification with Darktrace
Max Heinemeyer, Director of Threat Hunting
Monday January 22, 2018
The implications of TRITON for the future of ICS security
Andrew Tsonchev, Director of Technology, Darktrace Industrial
Friday December 8, 2017
Expediting the investigation of widespread Trojan infections with Darktrace
Max Heinemeyer, Director of Threat Hunting
Monday November 27, 2017
Smuggled Raspberry Pis attempt to steal passwords
Andrew Tsonchev, Director of Cyber Analysis
Monday October 30, 2017
A new botnet discovered using IoT drawing pads for reflection attacks
Justin Fier, Director of Cyber Analysis
Wednesday October 25, 2017
Down the BadRabbit Hole
Max Heinemeyer, Director of Threat Hunting
Thursday October 12, 2017
The ‘Matrix Banker’ Reloaded
Max Heinemeyer, Director of Threat Hunting
Monday October 2, 2017
Resurgence of the Feodo banking Trojan on a government network
Andrew Tsonchev, Director of Cyber Analysis
Monday September 18, 2017
How a cloud server nearly released IP at a major manufacturing company
Andrew Tsonchev, Director of Cyber Analysis
Monday July 31, 2017
How Darktrace’s AI detects metamorphic malware
Justin Fier, Director of Cyber Intelligence & Analytics
Thursday June 29, 2017
Darktrace’s perspective on the NotPetya attack
Dave Palmer, Director of Technology
Wednesday June 21, 2017
Every rule has an exception: How to detect insider threat without rules
Andrew Tsonchev, Director of Cyber Analysis
Wednesday May 17, 2017
WannaCry: Darktrace’s response to the global ransomware campaign
Andrew Tsonchev, Director of Cyber Analysis
Monday May 8, 2017
Defending against ransomware: a live threat scenario
Andrew Tsonchev, Director of Cyber Analysis
Wednesday April 5, 2017
Trust attacks and the evolution of ransomware
Dave Palmer, Director of Technology
Monday March 6, 2017
The threat is already inside
Justin Fier, Director of Cyber Intelligence
Monday February 13, 2017
Smile! You're on camera
Dave Palmer, Director of Technology
Monday January 30, 2017
Cyber-threats mean banks are no longer ‘too big to fail’
Justin Fier, Director of Cyber Intelligence
Monday January 9, 2017
AI will supercharge spear-phishing
Dave Palmer, Director of Technology
Friday December 16, 2016
5 cyber security predictions for 2017
Justin Fier, Director of Cyber Intelligence
Monday December 5, 2016
The Internet of Stranger Things
Dave Palmer, Director of Technology
Friday November 18, 2016
Holiday hacking: Cyber-attacks on Cyber Monday
Justin Fier, Director of Cyber Intelligence
Friday November 4, 2016
2016: The year of election tampering?
Justin Fier, Director of Cyber Intelligence
Monday October 24, 2016
6 emerging cyber-threats you didn’t see in the news
Justin Fier, Director of Cyber Intelligence