Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plataforma
Productos
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Gestión integral de riesgos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Investiga cada alerta como un humano analista, a la velocidad y la escala de la IA
Servicios Darktrace
Maximice sus inversiones en seguridad con el soporte experto las 24 horas del día, los 7 días de la semana, y la gestión de incidentes de nuestro equipo global de SOC.
Centro de investigación de IA
Recursos
Clientes
Blog
Eventos
Dentro del SOC
La inferencia
Glosario
Todos los recursos
Libro blanco
Informe de amenazas semestral de 2024
Empresa
Carreras
Liderazgo
Noticias
Federal
Inversores
Academia
Jurídico
SDR Academy
Acerca de nosotros
Contactar
Socios
Visión general
Portal de socios
Socios tecnológicos
Integraciones
Socios destacados
Microsoft
AWS
Productos
Visión general
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Defienda los sistemas críticos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Servicios
Centro de investigación de IA
Recursos
Todos los recursos
Clientes
Blog
Eventos
La inferencia
Dentro del SOC
Glosario
Empresa
Acerca de nosotros
Contactar
Carreras
Liderazgo
Noticias
Federal
Academia
SDR Academy
Jurídico
Socios
Visión general
Portal de socios
Socios tecnológicos
Conviértase en socio
Integraciones
Microsoft
AWS
McLaren
Obtenga una demostración
Obtenga una demo
Get a demo
Darktrace Blog
Email
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Rhoncus aenean vel elit scelerisque mauris pellentesque. Sed cras ornare arcu dui vivamus arcu.
Latest Blog Posts
Defending Against Personalized Cyber Attacks
Stay informed about the latest trends in cyber threats with Darktrace experts, including how attacks are evolving and becoming more personalized.
How Darktrace Triumphed Over MyKings Botnet
Darktrace has provided full visibility over the MyKings botnet kill chain from the beginning of its infections to the eventual cryptocurrency mining activity.
Detecting PurpleFox Rootkit with Darktrace AI
The PurpleFox rootkit poses significant risks. Discover how Darktrace leveraged advanced techniques to combat this persistent cyber threat.
70 million in Cybersecurity Funding for Electric Cooperatives & Utilities
Discover how the Bipartisan Infrastructure Law and its $250M Rural and Municipal Utility Cybersecurity Program empower electric cooperatives and municipalities to strengthen cybersecurity. Learn how innovative tools like anomaly detection, IT/OT integration, and AI-driven solutions enhance resilience against modern threats.
Understanding and Mitigating Sectop RAT
Understand the risks posed by the Sectop remote access Trojan and how Darktrace implements strategies to enhance cybersecurity defenses.
Using Darktrace for Threat Hunting
Read about effective threat hunting techniques with Darktrace, focusing on identifying vulnerabilities and improving your security measures.
How PlugX Malware Has Evolved & Adapted
Discover how Darktrace effectively detected and thwarted the PlugX remote access trojan in 2023 despite its highly evasive and adaptive nature.
Understanding Cloud Security with Darktrace
Darktrace's autonomous response successfully thwarted a Trickbot intrusion. See how AI played a crucial role in this defense.
Exploring AI Threats: Package Hallucination Attacks
Learn how malicious actors exploit errors in generative AI tools to launch packet attacks. Read how Darktrace products detect and prevent these threats!
Protecting Brazilian Organizations from Malware
Discover how Darktrace DETECT thwarted a banking trojan targeting Brazilian organizations, preventing data theft and informing the customer.
Unveiling ViperSoftX: A Darktrace Investigation
Read about the ViperSoftX threat and how Darktrace's innovative detection methods exposed this cyber intrusion and its potential impacts.
How Darktrace Stopped an Account Hijack Fast
Learn how Darktrace detected an account hijack within days of deployment. Discover the strategies used to protect against cyber threats.
Utilizing AI Security Against Phishing Campaigns
Learn how Darktrace leveraged generative AI tools to detect and combat phishing email campaigns. Discover how AI is reshaping cybersecurity strategies.
How Darktrace Detected Black Basta Ransomware
Discover how Darktrace uncovered Black Basta ransomware. Learn about its tactics, techniques, and how to protect your network from this threat.
AI Function Assistance to Humans in Cyber Crises
See how AI can assist human security teams and think logically to manage cyber incidents efficiently in situations where variables are fast-moving. Read more!
How Darktrace Stopped Akira Ransomware
Learn how Darktrace is uniquely placed to identify and contain the novel Akira ransomware strain, first observed in March 2023.
Darktrace & FERC Order 887: Enhancing Cybersecurity
Understand Darktrace's role in supporting FERC Order 887 and its efforts to improve cybersecurity measures.
The Rise of MaaS & Lumma Info Stealer
Discover the rise of the Lumma info stealer and its implications for cybersecurity. Learn how this malware targets sensitive information.
Preparing Security Defenses For the AI Cyber Attack Era
The threat of AI being used in cyberattacks is growing. Learn how Darktrace is harnessing the power of AI to protect security systems against these attacks.
Analyzing Post-Exploitation on Papercut Servers
Dive into our analysis covering post-exploitation activity on PaperCut servers. Learn the details and impact of this attack and how to keep yourself safe!
Previous
Next