Webinar, April 14th |  Introducing the Adaptive Era of Email Security  |   Register Now
Darktrace LIVE: Global Roadshow | Secure AI, Unlock Innovation | Register Now
Platform
Darktrace ActiveAI Security Platform™
Discover now
Platform Products
Cross Platform Products
AI Investigations
/ NETWORK

Proactive protection

/ EMAIL

Cloud-native AI security

/ CLOUD

Complete cloud coverage

/ SECURE AI NEW

Deploy agents confidently

/ OT

Comprehensive OT security

/ IDENTITY

360º user protection

/ ENDPOINT

Coverage for every device

/ Proactive Exposure Management
/ Adaptive Human Defense
/ Attack Surface Management
/ Forensic Acquisition & Investigation
/ Incident Readiness & Recovery
/ Cyber AI Analyst

Accelerate triage by 10x

More
Services

Defend with confidence

Integrations

Connect with anything

Solutions
Use Cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
APTs
Phishing
Data Loss
Account Takeover
Insider Threats
Supply Chain Attacks
Business Email Compromise
Customer stories
See how we solve problems for our 10,000+ customers
Inside the SOC
Technical deep dives of cyber incidents and the latest threat trends
Why Darktrace
The Darktrace Difference
Company
Inside Darktrace
Our AI
Our Customers
Industry Recognition
About Us
Events
News
Leadership
Careers
Contact Us
Federal
Trust Center

Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for NDR

Darktrace LIVE: Secure AI, Unlock Innovation
Coming to a city near you | Register now →
Partners
Darktrace Partners
Cloud Partnerships
Inside Darktrace
Overview
Technology Partners
Partner Portal
Microsoft
AWS

Discover the value a partnership with Darktrace can bring to you and your customers, as we fundamentally transform your ability to reduce cyber disruption.

Resources
Blogs
Further Resources
Featured Resource
The Darktrace Blog

Latest security trends and tips

Inside the SOC

Real threats in real environments

Resource Library

Threat reports, CISO guides, and more

Customer Stories

10,000 organizations of all sizes

Cyber AI Glossary

An A-Z of all things cyber

Uncover findings from our survey of 1500 cybersecurity professionals on how AI is shaping concerns and priorities

Securing AI in the Enterprise
Take the next step toward securing AI in your environment.
Get a demo
Platform
/ NETWORK

Proactive protection

/ EMAIL

Cloud-native AI security

/ CLOUD

Complete cloud coverage

/ SECURE AI

Deploy agents confidently

/ OT

Comprehensive risk management

/ IDENTITY

360º user protection

/ ENDPOINT

Coverage for every device

/ Proactive Exposure Management
/ Adaptive Human Defense
/ Attack Surface Management
/ Forensic Acquisition & Investigation
/ Incident Readiness & Recovery
/ Cyber AI Analyst

Accelerate triage by 10x

Services

Defend with confidence

Integrations

Connect with anything

Darktrace ActiveAI Security Platform™
Spot novel threats across your whole organization.
Solutions
Use cases
Ransomware
Account Takeover
APTs
Insider Threats
Phishing
Supply Chain Attacks
Data Loss
Business Email Compromise
Inside the SOC
Technical deep dives of cyber incidents and the latest threat trends
Why Darktrace
The Darktrace Difference
Our AI
Our Customers
Industry Recognition
About Us
Company
Events
News
Leadership
Careers
Contact Us
Federal
Trust Center
Darktrace LIVE
Coming to a city near you | Register now →
Partners
Darktrace Partners
Overview
Technology Partners
Partner Portal
Further Partners
Microsoft
AWS
Darktrace Partner Portal
Stronger Together: Defend, Disrupt, Deliver
Resources
Blogs
The Darktrace Blog
Inside the SOC
The Inference
Further Resources
Resource Library
Customer Stories
Cyber AI Glossary
Securing AI in the Enterprise
Take the next step
Get a demo

The Darktrace Blog

Stay ahead of today’s cyber threats

Expert insights and practical guidance to help you strengthen your organization’s cybersecurity in the modern era.

Network
Written by:
Nathaniel Jones
|
Apr 2, 2026

How Chinese-Nexus Cyber Operations Have Evolved – And What It Means For Cyber Risk and Resilience 

Darktrace's latest threat research reveals how Chinese-nexus cyber operations have evolved from isolated intrusions into long-term strategic positioning, with attackers prioritizing persistent access to critical infrastructure and digital ecosystems to gain lasting operational and economic advantage.
Read more
Proactive Security
Written by:
|
Mar 31, 2026

AI-powered security for a rapidly growing grocery enterprise

Read more
Network
Written by:
Isabel Evans
|
Mar 26, 2026

Phantom Footprints: Tracking GhostSocks Malware

Read more
Email
Written by:
Carlos Gray
|
Mar 24, 2026

Darktrace Unites Human Behavior and Threat Detection Across Email, Slack, Teams, and Zoom

Read more

Most read

Network

Campaign Trail

Written by:
Nathaniel Jones
|
Oct 20, 2025

Salty Much: Darktrace’s view on a recent Salt Typhoon intrusion

Read now

Campaign Trail

Written by:
Tara Gould
|
Jul 10, 2025

Crypto Wallets Continue to be Drained in Elaborate Social Media Scam

Read now
Proactive Security

Industry Insights

Written by:
Nathaniel Jones
|
Jul 2, 2025

Pre-CVE Threat Detection: 10 Examples Identifying Malicious Activity Prior to Public Disclosure of a Vulnerability

Read now

Inside the SOC:
Threat research and real incident analysis

A series exclusively authored by Darktrace’s expert cyber analysts, featuring
technical deep dives into cyber incidents and the latest threat trends.

George Kim
|
Mar 10, 2026
NetSupport RAT: How Legitimate Tools Can Be as Damaging as Malware
Read more
Nathaniel Bill
|
Mar 4, 2026
Inside Cloud Compromise: Investigating Attacker Activity with Darktrace / Forensic Acquisition & Investigation
Read more
Emma Foulger
|
Feb 13, 2026
CVE-2026-1731: How Darktrace Sees the BeyondTrust Exploitation Wave Unfolding
Read more
Go Inside the SOC
Newsletter

Stay ahead of threats with the Darktrace blog newsletter

Get the latest insights from the cybersecurity landscape, including threat trends, incident analysis, and the latest Darktrace product developments – delivered directly to your inbox, monthly.

Browse all blogs

Cybersecurity insights for security leaders who can’t afford blind spots.

Topics
Industry
Proactive Security
Written by:
Jamie Woodland
|
Mar 4th, 2024

How Community Housing LTD Enhanced Incident Response

Email
Written by:
Carlos Gray
|
Feb 29th, 2024

Navigating Email Security Gaps Beyond DMARC

Inside the SOC
Written by:
Sam Lister
|
Feb 29th, 2024

Protecting Against AlphV BlackCat Ransomware

Inside the SOC
Written by:
Nicole Wong
|
Feb 23rd, 2024

Quasar Remote Access Tool and Its Security Risks

Identity
Written by:
Kendra Gonzalez Duran
|
Feb 22nd, 2024

Attack Trends: VIP Impersonation in the Business Hierarchy

Inside the SOC
Written by:
The Darktrace Community
|
Feb 20th, 2024

Migo: A Redis Miner with Novel System Weakening Techniques

Inside the SOC
Written by:
Ashiq Shafee
|
Feb 15th, 2024

Detecting & Containing Gootloader Malware

Written by:
The Darktrace Threat Research Team
|
Feb 13th, 2024

Predicting the Future of Cyber Security and Cyber Threats

Inside the SOC
Written by:
Signe Zaharka
|
Feb 8th, 2024

How CoinLoader Hijacks Networks

Previous
Show more
27 / 61
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Compliance

Our compliance certifications are also recognized

Get a demo

Featured resource

The State of AI Cybersecurity 2026: Executive Summary

Annual Threat Report 2025

The AI Arsenal: Understanding the Tools Shaping Cybersecurity

Your data. Our AI.
Elevate your cybersecurity with Darktrace AI
Get a demo
Español
English
Française
Deutsch
Español
日本語
English
Française
Deutsch
Español
日本語
Productos
Descripción general de los productos
Plataforma
/NETWORK
/CORREO ELECTRÓNICO
/NUBE
/ SECURE AI
/OT
/IDENTIDAD
/ENDPOINT
Complementos de plataforma
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/ Forensic Acquisition & Investigation
/Preparación y recuperación ante incidentes
Servicios
Visión general
Empresa
Acerca de nosotros
Contactar
Noticias
Liderazgo
Inversores
Carreras
Academia
Academy
Federal
Trust Center
Legal
Adquisición de Thoma Bravo
Nuestra IA
Analista de Cyber IA
Centro de investigación de IA
Recursos
Todos los recursos
Blog
Clientes
Portal de clientes
Eventos
La inferencia
Dentro del SOC
Glosario
Socios
Descripción general de los socios
Socios tecnológicos
Integraciones
Portal de socios
Política de privacidadPolítica de cookiesDeclaración sobre la Ley de esclavitud modernaEstrategia de impuestos públicosPolítica de divulgación de vulnerabilidades
Derechos de autor 2025 Darktrace Holdings Limited. Todos los derechos reservados.