Productos
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Gestión integral de riesgos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Investiga cada alerta como un humano analista, a la velocidad y la escala de la IA
Servicios Darktrace
Maximice sus inversiones en seguridad con el soporte experto las 24 horas del día, los 7 días de la semana, y la gestión de incidentes de nuestro equipo global de SOC.
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
Centro de investigación de IA
Recursos
Clientes
Blog
Eventos
Dentro del SOC
La inferencia
Glosario
Todos los recursos
Libro blanco
Informe de amenazas semestral de 2024
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Socios
Visión general
Portal de socios
Socios tecnológicos
Integraciones
Socios destacados
Microsoft
AWS
Productos
Visión general
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Defienda los sistemas críticos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Servicios
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Centro de investigación de IA
Recursos
Todos los recursos
Clientes
Blog
Eventos
La inferencia
Dentro del SOC
Glosario
Empresa
Acerca de nosotros
Contactar
Carreras
Liderazgo
Noticias
Federal
Academia
SDR Academy
Jurídico
Socios
Visión general
Portal de socios
Socios tecnológicos
Conviértase en socio
Integraciones
Microsoft
AWS
McLaren
Obtenga una demostración
Obtenga una demo
Get a demo
Darktrace / Network blog
Across the network
Darktrace / Network is in action all over the globe. Learn more about what’s behind it from Darktrace experts.
Latest Blog Posts
Blog
Detecting Trusted Network Relationship Abuse
Discover how Darktrace DETECT and the SOC team responded to a network compromise via a trusted partner relationship with this case study.
Blog
Uncovering CyberCartel Threats in Latin America
Examine the growing threat of cyber cartels in Latin America and learn how to safeguard against their attacks.
Blog
How Darktrace Triumphed Over MyKings Botnet
Darktrace has provided full visibility over the MyKings botnet kill chain from the beginning of its infections to the eventual cryptocurrency mining activity.
Blog
Detecting PurpleFox Rootkit with Darktrace AI
The PurpleFox rootkit poses significant risks. Discover how Darktrace leveraged advanced techniques to combat this persistent cyber threat.
Blog
Understanding and Mitigating Sectop RAT
Understand the risks posed by the Sectop remote access Trojan and how Darktrace implements strategies to enhance cybersecurity defenses.
Blog
How PlugX Malware Has Evolved & Adapted
Discover how Darktrace effectively detected and thwarted the PlugX remote access trojan in 2023 despite its highly evasive and adaptive nature.
Blog
Protecting Brazilian Organizations from Malware
Discover how Darktrace DETECT thwarted a banking trojan targeting Brazilian organizations, preventing data theft and informing the customer.
Blog
Unveiling ViperSoftX: A Darktrace Investigation
Read about the ViperSoftX threat and how Darktrace's innovative detection methods exposed this cyber intrusion and its potential impacts.
Blog
How Darktrace Detected Black Basta Ransomware
Discover how Darktrace uncovered Black Basta ransomware. Learn about its tactics, techniques, and how to protect your network from this threat.
Blog
How Darktrace Stopped Akira Ransomware
Learn how Darktrace is uniquely placed to identify and contain the novel Akira ransomware strain, first observed in March 2023.
Blog
The Rise of MaaS & Lumma Info Stealer
Discover the rise of the Lumma info stealer and its implications for cybersecurity. Learn how this malware targets sensitive information.
Blog
Darktrace’s Detection of Unattributed Ransomware
Leveraging anomaly-based detection, we successfully identified an ongoing ransomware attack on the network of a customer and the activity that preceded it.
Blog
Successfully Containing an Admin Credential Attack
Discover how Darktrace's anomaly-based threat detection thwarted a cyber-attack on a customer's network, stopping a malicious actor in their tracks.
Blog
Darktrace's Detection of Ransomware & Syssphinx
Read how Darktrace identified an attack technique by the threat group, Syssphinx. Learn how Darktrace's quick identification process can spot a threat.
Blog
Revealing Outlaw's Returning Features & New Tactics
Darktrace's investigation of the latest Outlaw crypto-mining operation, covering the resurgence of old tactics along with the emergence of new ones.
Blog
How Darktrace Quickly Foiled An Information Stealer
Discover how Darktrace thwarted the CryptBot malware in just 2 seconds. Learn about this fast-moving threat and the defense strategies employed.
Blog
Darktrace Detection of 3CX Supply Chain Attack
Explore how the 3CX supply chain compromise was uncovered, revealing key insights into the detection of sophisticated cyber threats.
Blog
Darktrace’s Detection of a Hive Ransomware-as-Service
This blog investigates a new strain of ransomware, Hive, a ransomware-as-a-service. Darktrace was able to provide full visibility over the attacks.
Blog
Gozi ISFB Malware Detection Insights and Analysis
Uncover how Gozi ISFB operates and how Darktrace’s detection capabilities help secure your systems against this versatile malware.
Blog
Understanding Qakbot Infections and Attack Paths
Explore the network-based analysis of Qakbot infections with Darktrace. Learn about the various attack paths used by cybercriminals and Darktrace's response.
Previous
Next
Casos de uso
Blog
Historias de clientes
Integraciones
Obtenga una demostración