Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plataforma
Productos
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Gestión integral de riesgos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Investiga cada alerta como un humano analista, a la velocidad y la escala de la IA
Servicios Darktrace
Maximice sus inversiones en seguridad con el soporte experto las 24 horas del día, los 7 días de la semana, y la gestión de incidentes de nuestro equipo global de SOC.
Centro de investigación de IA
Recursos
Clientes
Blog
Eventos
Dentro del SOC
La inferencia
Glosario
Todos los recursos
Libro blanco
Informe de amenazas semestral de 2024
Empresa
Carreras
Liderazgo
Noticias
Federal
Inversores
Academia
Jurídico
SDR Academy
Acerca de nosotros
Contactar
Socios
Visión general
Portal de socios
Socios tecnológicos
Integraciones
Socios destacados
Microsoft
AWS
Productos
Visión general
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Defienda los sistemas críticos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Servicios
Centro de investigación de IA
Recursos
Todos los recursos
Clientes
Blog
Eventos
La inferencia
Dentro del SOC
Glosario
Empresa
Acerca de nosotros
Contactar
Carreras
Liderazgo
Noticias
Federal
Academia
SDR Academy
Jurídico
Socios
Visión general
Portal de socios
Socios tecnológicos
Conviértase en socio
Integraciones
Microsoft
AWS
McLaren
Obtenga una demostración
Obtenga una demo
Get a demo
Darktrace Blog
Email
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Rhoncus aenean vel elit scelerisque mauris pellentesque. Sed cras ornare arcu dui vivamus arcu.
Latest Blog Posts
Modernising UK Cyber Regulation: Implications of the Cyber Security and Resilience Bill
The UK Government’s upcoming Cyber Security and Resilience Bill (CSRB) will modernise the UK’s 2018 NIS regime, extend regulatory duties to managed service providers and data‑centre operators, and tighten supply‑chain oversight. This blog explains the policy intent and outlines practical implications for service providers and enterprise security leaders.
Unpacking ClickFix: Darktrace’s detection of a prolific social engineering tactic
ClickFix is a social engineering technique that exploits human error through fake prompts, leading users to unknowingly run malicious commands. Learn how Darktrace detects and responds to such threats!
Beyond Discovery: Adding Intelligent Vulnerability Validation to Darktrace / Attack Surface Management
Darktrace adds exploit prediction assessment to attack surface management with 6.3 update. Learn more about the latest innovations here.
Darktrace Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Darktrace announces its Leader position in the inaugural Gartner® Magic Quadrant™ for Network Detection and Response (NDR).
Por qué los enfoques de seguridad del e-mail centrados en ataques no pueden hacer frente a las amenazas modernas.
Despite evolving email threats, many organizations still rely on SEGs or outdated, attack-focused methods. These approaches can’t counter advanced, AI-driven attacks. The solution? Business-centric email security that understands users and inbox behavior, not just threats.
PumaBot: una nueva botnet dirigida a dispositivos de vigilancia de IoT.
Darktrace investigated “PumaBot,” a Go-based Linux botnet targeting IoT devices. It avoids internet-wide scanning, instead using a C2 server to get targets and brute-force SSH credentials. Once inside, it executes remote commands and ensures persistence.
De Rockstar2FA a FlowerStorm: Investigando de una plataforma nueva de phishing as a service.
FlowerStorm is a phishing-as-a-service platform that leverages Adversary-in-the-Middle attacks to steal Microsoft 365 credentials and bypass MFA. Darktrace detected a SaaS compromise linked to FlowerStorm, identifying suspicious logins, password resets, and privilege escalation attempts, enabling early containment through AI-driven threat detection and response.
Defending the Frontlines: Proactive Cybersecurity in Local Government
To quickly identify and respond to threats before damage occurs, this local government relies on Darktrace to improve network visibility, stop insider threats, protect its email systems, and accelerate incident investigations.
Evaluating Email Security: How to Select the Best Solution for Your Organization
In today’s saturated market for email security, it can be difficult to cut through the noise of AI hype and vendor claims. CISOs should be using a structured evaluation framework to support informed, objective comparisons of different vendors – to allow them to make the best decision for their organization.
Adapting to new USCG cybersecurity mandates: Darktrace for ports and maritime systems
Darktrace uses AI-led OT, IoT, and IT Network Security to help secure maritime transportation systems. This blog describes some of the new mandated requirements by the USCG and demonstrates Darktrace’s security capabilities.
Catching a RAT: How Darktrace Neutralized AsyncRAT
Darktrace's AI-driven tools identified and disrupted AsyncRAT activity, detecting suspicious connections and blocking them autonomously. This proactive response prevented the compromise from escalating and safeguarded sensitive data from exfiltration.
Revolutionizing OT Risk Prioritization with Darktrace 6.3
Darktrace / OT introduces IEC-62443 compliance reporting, expanded protocol visibility, and dynamic risk modeling, redefining how OT teams prioritize risks with contextual insights now additionally powered by firewall rule analysis and KEV scoring, all purpose-built to protect industrial operations and safety.
Anomaly-Based Threat Hunting: Darktrace's Approach in Action
This blog outlines Darktrace's model-based anomaly detection and how security teams can leverage custom models for targeted threat hunts. Recently, Darktrace's Threat Research team applied this method in their report, "AI & Cybersecurity: The State of Cyber in UK and US Energy Sectors."
Combatting the Top Three Sources of Risk in the Cloud
The biggest sources of risk in the cloud are misconfigurations, IAM failures, and infrastructure that is unprepared to handle cross-domain threats. Learn how AI-powered cloud security tools can help security teams identify and mitigate these risks.
SocGholish: From loader and C2 activity to RansomHub deployment
In early 2025, Darktrace uncovered SocGholish-to-RansomHub intrusion chains, including loader and C2 activity, alongside credential harvesting via WebDAV and SCF abuse. Learn more about SocGholish and its kill chain here!
Your Vendors, Your Risk: Rethinking Third-Party Security in the Age of Supply Chain Attacks
Protecting against supply chain cyber-attacks means safeguarding not just your network, but your customers’ trust. Learn why securing vendor relationships is essential in today’s threat landscape.
Boosting Security with Azure Virtual Network TAP Traffic Mirroring
Discover why Darktrace is a launch partner for the Public Preview of Microsoft Azure Virtual Network Terminal Access Point (TAP).
MFA Under Attack: AiTM Phishing Kits Abusing Legitimate Services
Tycoon 2FA uses AiTM phishing and legitimate services to bypass MFA. Darktrace AI stopped it, read the blog to learn how Self-Learning AI detects sophisticated threats.
The Importance of NDR in Resilient XDR
Learn why EDR alone is not enough and how NDR uncovers and stops threats that disable or bypass endpoint security.
Obfuscation Overdrive: Next-Gen Cryptojacking with Layers
Docker is a prime target for malware, with new strains emerging daily. This blog explores a novel campaign showcasing advanced obfuscation and cryptojacking techniques.
Next