Darktrace anuncia su intención de adquirir Cado Security.
Lea el comunicado de prensa
Plataforma
Productos
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Gestión integral de riesgos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Investiga cada alerta como un humano analista, a la velocidad y la escala de la IA
Servicios Darktrace
Maximice sus inversiones en seguridad con el soporte experto las 24 horas del día, los 7 días de la semana, y la gestión de incidentes de nuestro equipo global de SOC.
Centro de investigación de IA
Recursos
Clientes
Blog
Eventos
Dentro del SOC
La inferencia
Glosario
Todos los recursos
Libro blanco
Informe de amenazas semestral de 2024
Empresa
Carreras
Liderazgo
Noticias
Federal
Inversores
Academia
Jurídico
SDR Academy
Acerca de nosotros
Contactar
Socios
Visión general
Portal de socios
Socios tecnológicos
Integraciones
Socios destacados
Microsoft
AWS
McLaren
Productos
Visión general
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Defienda los sistemas críticos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Servicios
Centro de investigación de IA
Recursos
Todos los recursos
Clientes
Blog
Eventos
La inferencia
Dentro del SOC
Glosario
Empresa
Acerca de nosotros
Contactar
Carreras
Liderazgo
Noticias
Federal
Academia
SDR Academy
Jurídico
Socios
Visión general
Portal de socios
Socios tecnológicos
Conviértase en socio
Integraciones
Microsoft
AWS
McLaren
Obtenga una demostración
Obtenga una demo
Get a demo
Darktrace / Email blog
Email under attack
Darktrace experts share news and findings about the threat landscape affecting the inbox.
Latest blog posts
Blog
How Phishing Attacks Are Becoming Harder to Identify
Learn about the cyber risks posed by advanced phishing attacks and how AI can enhance security solutions to defend against them.
Blog
Malicious Use of Dropbox in Phishing Attacks
Understand the tactics of phishing attacks that exploit Dropbox and learn how to recognize and mitigate these emerging cybersecurity threats.
Blog
Navigating Email Security Gaps Beyond DMARC
Discover Darktrace's strategies for navigating email security gaps beyond DMARC. Enhance your defenses with advanced threat detection and mitigation.
Blog
Utilizing AI Security Against Phishing Campaigns
Learn how Darktrace leveraged generative AI tools to detect and combat phishing email campaigns. Discover how AI is reshaping cybersecurity strategies.
Blog
Detection of an Evasive Credential Harvester | IPFS Phishing
Discover the emerging trend of malicious actors abusing the Interplanetary File System (IPFS) file storage protocol in phishing campaigns. Learn more here!
Blog
How Darktrace SOC Thwarted a BEC Attack
Discover how Darktrace's SOC detected and stopped a Business Email Compromise in a customer's SaaS environment.
Blog
Understanding Email Security & the Psychology of Trust
We explore how psychological research into the nature of trust relates to our relationship with technology - and what that means for AI solutions.
Blog
Detecting and Responding to Vendor Email Compromises (VEC)
Learn how Darktrace detected and responded to a March 2023 Vendor Email Compromise (VEC) attacks on customer in the energy industry. Read more here!
Blog
How Darktrace Foiled QR Code Phishing
Explore Darktrace's successful detection of QR code phishing. Understand the methods used to thwart these sophisticated cyber threats.
Blog
Breaking Down "ICES": An Umbrella Term With Wide Variety
Integrated Cloud Email Security (ICES) can be an effective email security solution, but Darktrace/Email's self-learning AI should be your solution of choice.
Blog
Flexible Deployments for Enhanced Email Security
Learn about the benefits of flexible deployment with Darktrace's cutting-edge technology. Explore how to stay ahead of email attacks and stay safe with AI.
Blog
Boosting Security Posture with Email Integration
Protect your organization from cyber-attacks with a strong security strategy. Learn how to safeguard against threats targeting email, cloud apps, and beyond.
Blog
Employee-Conscious Email Security Solutions in the Workforce
Email threats commonly affect organizations. Read Darktrace's expert insights on how to safeguard your business by educating employees about email security.
Blog
Detecting Malicious Email Activity & AI Impersonating
Discover how two different phishing attempts from some known and unknown senders used a payroll diversion and credential sealing box link to harm users.
Blog
Enhancing Security Teams with AI-Powered Email Solutions
Discover email-based attack challenges & how AI security solutions can tackle these attacks with autonomous action, optimized workflows, and user visibility.
Blog
Email Security & Future Innovations: Educating Employees
As online attackers change to targeted and sophisticated attacks, Darktrace stresses the importance of protection and utilizing steady verification codes.
Blog
Securing Credit Unions: Darktrace Email Security
Discover how Darktrace ensures compliant email security for credit unions. Learn about advanced risk management and protection strategies.
Blog
Uncover New Malicious Email Payloads in Google Translate
Discover how threat actors are concealing malicious email payloads within Google Translate domains. Learn how Darktrace responds to these attacks effectively.
Blog
How Darktrace AI Isn't Fooled by Impersonation Tactics
Learn how Darktrace AI outsmarts impersonation tactics in cybersecurity. Discover cutting-edge security insights and how to keep yourself safe.
Blog
Bytesize Security: A Guide to HTML Phishing Attachments
Darktrace guides you through the common signs of HTML phishing attachments, including common phishing emails, clever impersonations, fake webpages, and more.
Previous
Next
Casos de uso
Phishing
Ransomware
Ataques a la cadena de suministro
Toma de control de cuenta
Blog
Historias de clientes
Integraciones
Obtenga una demostración
Your data. Our AI.
Elevate your email security with Darktrace AI
Get a demo