Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plataforma
Productos
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Gestión integral de riesgos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Investiga cada alerta como un humano analista, a la velocidad y la escala de la IA
Servicios Darktrace
Maximice sus inversiones en seguridad con el soporte experto las 24 horas del día, los 7 días de la semana, y la gestión de incidentes de nuestro equipo global de SOC.
Centro de investigación de IA
Recursos
Clientes
Blog
Eventos
Dentro del SOC
La inferencia
Glosario
Todos los recursos
Libro blanco
Informe de amenazas semestral de 2024
Empresa
Carreras
Liderazgo
Noticias
Federal
Inversores
Academia
Jurídico
SDR Academy
Acerca de nosotros
Contactar
Socios
Visión general
Portal de socios
Socios tecnológicos
Integraciones
Socios destacados
Microsoft
AWS
Productos
Visión general
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Defienda los sistemas críticos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Servicios
Centro de investigación de IA
Recursos
Todos los recursos
Clientes
Blog
Eventos
La inferencia
Dentro del SOC
Glosario
Empresa
Acerca de nosotros
Contactar
Carreras
Liderazgo
Noticias
Federal
Academia
SDR Academy
Jurídico
Socios
Visión general
Portal de socios
Socios tecnológicos
Conviértase en socio
Integraciones
Microsoft
AWS
McLaren
Obtenga una demostración
Obtenga una demo
Get a demo
Darktrace Blog
Email
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Rhoncus aenean vel elit scelerisque mauris pellentesque. Sed cras ornare arcu dui vivamus arcu.
Latest Blog Posts
Darktrace Cyber Analyst Investigates Sodinokibi Ransomware
Darktrace’s Cyber AI Analyst uncovers the intricate details of a Sodinokibi ransomware attack on a retail organization. Dive into this real-time incident.
Mimecast Link Rewriting: A False Sense of Security Exposed
Gain insight into modern email security methods to ensure you avoid pitfalls of traditional email gateways. Learn why rewriting links isn't the best approach.
Protecting Healthcare Organizations from Maze Ransomware
Discover how Darktrace detected and protected a healthcare organization from a Maze ransomware attack. Stay informed and protect your data today.
Protecting Industrial Control Systems in the Cloud
The impact of water utility firms in the UK moving SCADA systems to the cloud. Explore ICSaaS and its security implications in practice.
How AI Detected A Hacker Hiding in Energy Grid Within Hours
Darktrace's AI swiftly detected a hacker infiltrating an energy grid within hours. Learn about how AI identified the threat and uncovered anomalous behavior.
Wide Scale Email Compromise Due to Mimecast Miss
Learn how a Mimecast misstep led to a large-scale email compromise and how DarkTrace AI detected the threat. Stay informed and protected against cyber threats.
Detecting OT Threats: ICS Attack at International Airport
Learn how Darktrace's OT Threat Detection technology identified a sophisticated ICS attack on an international airport. Read more on Darktrace's blog.
The Rise of Stealthy Malware in Public Organizations
Gain insights into how malware attempts to infiltrate public organizations to steal data and the defenses needed to combat these threats.
Darktrace Detects Malicious ISO Files with AI Darktrace Email
Darktrace AI detects malicious ISO file in email attack. Learn more about how Antigena Email stopped the attack without relying on signatures or blacklists.
Emotet Resurgence: Email & Network Defense Insights
Explore how Darktrace's defense in depth strategy combats Emotet's resurgence in email and network layers, ensuring robust cybersecurity.
Evil Corp's WastedLocker Ransomware Attacks Observation
Darktrace detects Evil Corp intrusions with WastedLocker ransomware. Learn how AI spotted malicious activity, from initial intrusion to data exfiltration.
How Off-the-Shelf Tools Are Used for Ransomware
Discover how off-the-shelf tools empower cyber-criminals. Explore a ransomware incident involving a low-skilled threat actor targeting a retail organization.
Darktrace Uncovers COVID-19 Relief Email Scam
Learn about Darktrace's findings on a COVID-19 relief email spoof and how to protect against similar phishing attacks.
Darktrace Email Finds: Fake ShareFile Notification
Stay safe from phishing by recognizing fake ShareFile alerts and compromised supplier accounts in your email.
Darktrace AI Detects Anomalous Behavior in Empty Office
AI uncovered hackers mining cryptocurrency on a biometric server in a deserted office during COVID-19. Learn how Darktrace detected this attack in real-time.
Ransomware-As-A-Service Threat: Eking Targets Government
Discover how Eking ransomware targeted a government organization in APAC. Learn about ransomware as a service & the cyber AI technology that stopped the threat.
Guarding Against Threats Beyond IT
We explore insights from a vast customer database, exposing the widespread adoption of ICS protocols within IT settings.
How to Prevent Spear Phishing Attacks Post Twitter Hack
Twitter confirmed spear phishing as the cause of last month's attack. Learn about the limits of current defenses against spear phishing and how AI can stop it.
Insider Threats: Microsoft 365 Account Hijack
Darktrace's Cyber AI Platform swiftly detects and alerts on anomalous behavior in Microsoft 365 accounts in real-time.
WeTransfer Impersonation Attacks Caught by Darktrace AI
Darktrace email finds two WeTransfer impersonation attacks caught by AI. Learn how Antigena Email detected and stopped malicious spoofing attempts effectively.
Previous
Next