Darktrace anuncia su intención de adquirir Cado Security.
Lea el comunicado de prensa
Plataforma
Productos
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Gestión integral de riesgos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Investiga cada alerta como un humano analista, a la velocidad y la escala de la IA
Servicios Darktrace
Maximice sus inversiones en seguridad con el soporte experto las 24 horas del día, los 7 días de la semana, y la gestión de incidentes de nuestro equipo global de SOC.
Centro de investigación de IA
Recursos
Clientes
Blog
Eventos
Dentro del SOC
La inferencia
Glosario
Todos los recursos
Libro blanco
Informe de amenazas semestral de 2024
Empresa
Carreras
Liderazgo
Noticias
Federal
Inversores
Academia
Jurídico
SDR Academy
Acerca de nosotros
Contactar
Socios
Visión general
Portal de socios
Socios tecnológicos
Integraciones
Socios destacados
Microsoft
AWS
Productos
Visión general
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Defienda los sistemas críticos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Servicios
Centro de investigación de IA
Recursos
Todos los recursos
Clientes
Blog
Eventos
La inferencia
Dentro del SOC
Glosario
Empresa
Acerca de nosotros
Contactar
Carreras
Liderazgo
Noticias
Federal
Academia
SDR Academy
Jurídico
Socios
Visión general
Portal de socios
Socios tecnológicos
Conviértase en socio
Integraciones
Microsoft
AWS
McLaren
Obtenga una demostración
Obtenga una demo
Get a demo
Darktrace Blog
RESPOND
Hear from Darktrace in-house experts and customers on real-world applications of Autonomous Response that can take targeted action to contain cyber-threats.
Latest Blog Posts
AI and Cybersecurity: Predictions for 2025
Discover the role of AI in shaping cybersecurity predictions for 2025 and how organizations can prepare for emerging threats.
Understanding the NERC-CIP015 Internal Network Security Monitoring (INSM) requirements
Learn about NERC CIP-015 and its internal network security monitoring requirements. Discover how to ensure compliance and enhance your security posture.
Post-Exploitation Activities on Fortinet Devices: A Network-Based Analysis
This blog explores recent findings from Darktrace's Threat Research team on active exploitation campaigns targeting Fortinet appliances. This analysis focuses on the September 2024 exploitation of FortiManager via CVE-2024-47575, alongside related malicious activity observed in June 2024.
Phishing and Persistence: Darktrace’s Role in Defending Against a Sophisticated Account Takeover
In a recent incident, Darktrace uncovered a M365 account takeover attempt targeting a company in the manufacturing industry. The attacker executed a sophisticated phishing attack, gaining access through the organization’s SaaS platform. This allowed the threat actor to create a new inbox rule, potentially setting the stage for future compromises.
How Triada Affects Banking and Communication Apps
Explore the intricacies of the Triada Trojan and its targeting of communication and banking apps. Learn how to safeguard against this threat.
From Call to Compromise: Darktrace’s Response to a Vishing-Induced Network Attack
When a remote user fell victim to a vishing attack, allowing a malicious actor to gain access to a customer network, Darktrace swiftly detected the intrusion and responded effectively. This prompt action prevented any data loss and reinforced trust in Darktrace’s robust security measures.
Introducing real-time multi-cloud detection & response powered by AI
This blog announces the general availability of Microsoft Azure support for Darktrace / CLOUD, enabling real-time cloud detection and response across dynamic multi-cloud environments. Read more to discover how Darktrace is pioneering AI-led real-time cloud detection and response.
How Darktrace won an email security trial by learning the business, not the breach
Discover how Darktrace identified a sophisticated business email compromise (BEC) attack to successfully acquire a prospective customer in a trial alongside two other email security vendors. This case demonstrates the clear differentiator of true unsupervised machine learning applied to the right use cases, compared to miscellaneous vendor hype around AI.
Business Email Compromise (BEC) in the Age of AI
Generative AI tools have increased the risk of BEC, and traditional cybersecurity defenses struggle to stay ahead of the growing speed, scale, and sophistication of attacks. Only multilayered, defense-in-depth strategies can counter the AI-powered BEC threat.
Thread Hijacking: Infiltration Tactics Explained
Read about thread hijacking and how attackers exploit trusted conversations, compromising network security and user data. Stay informed.
How AI can help CISOs navigate the global cyber talent shortage
The global cybersecurity skills gap is widening, leaving many organizations vulnerable to increasing cyber threats. This blog explores how CISOs can implement AI strategies to make the most of their existing workforce through automation, consolidation and education.
FortiClient EMS Exploited: Attack Chain & Post Exploitation Tactics
Read about the methods used to exploit FortiClient EMS and the critical post-exploitation tactics that affect cybersecurity defenses.
What you need to know about FAA Security Protection Regulations 2024
This blog gives an overview of the proposed FAA regulations for safeguarding aviation systems and their cyber-physical networks. Read more to discover key points, challenges, and potential solutions for each use case.
Decrypting the Matrix: How Darktrace Uncovered a KOK08 Ransomware Attack
In May 2024, a Darktrace customer was affected by KOK08, a ransomware strain commonly used by the Matrix ransomware family. Learn more about the tactics used by this ransomware case, including double extortion, and how Darktrace is able to detect and respond to such threats.
Introducing ‘Defend Beyond’: Our promise to customers in the face of evolving threats
As we enter the era of AI, both the way businesses operate and the landscape that they operate within are changing. To continue to support our customers, we’ve refocused our mission to be the essential cybersecurity platform using AI to proactively defend against novel and known threats.
How Darktrace Detects TeamCity Exploitation Activity
Darktrace observed the rapid exploitation of a critical vulnerability in JetBrains TeamCity (CVE-2024-27198) shortly following its public disclosure. Learn how the need for speedy detection serves to protect against supply chain attacks.
How Darktrace’s AI Applies a Zero-Trust Mentality within Critical Infrastructure Supply Chains
Darktrace prevented a Critical National Infrastructure organization from falling victim to a SharePoint phishing attack originating from one of its trusted suppliers. This blog discusses common perceptions of zero-trust in email security, how AI that uses anomaly-based threat detection embodies core zero-trust principles and the relevance of this approach to securing CNI bodies with complex but interdependent supply chains from Cloud account compromise.
Darktrace Releases 2024 Half-Year Threat Insights
Explore Darktrace's 2024 Half-Year Threat Report for insights on the latest cyber threats and trends observed in the first half of the year.
Safelink Smuggling: Enhancing Resilience Against Malicious Links
Gain insights into safelink smuggling tactics and learn strategies to protect your organization from the dangers posed by malicious links.
CDR is just NDR for the Cloud... Right?
As cloud adoption surges, the need for scalable, cloud-native security is paramount. This blog explores whether Cloud Detection and Response (CDR) is merely Network Detection and Response (NDR) tailored for the cloud, highlighting the unique challenges and essential solutions SOC teams require to secure dynamic cloud environments effectively.
Previous
Next