Platforme
Darktrace ActiveAI Security Platform™
Découvrez maintenant
Produits de plateforme
Produits transverses
Enquêtes IA
/ NETWORK

Protection du réseau

/ EMAIL

Sécurité des e‑mails

/ CLOUD

Sécurité IA native dans le cloud

/ SECURE AI NEW

Déployez les agents en toute confiance

/ OT

Sécurité OT complète

/ IDENTITY

Protection utilisateur à 360°

/ ENDPOINT

Couverture pour chaque appareil

/ Proactive Exposure Management
/ Attack Surface Management
/ Forensic Acquisition & Investigation
/ Incident Readiness & Recovery
/ Cyber AI Analyst

Accélérez le triage par 10×

More
Services

Défendez-vous en toute confiance

Intégrations

Connectez-vous à tout

Use Cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
APTs
Phishing
Data Loss
Account Takeover
Insider Threats
Supply Chain Attacks
Business Email Compromise
Customer stories
See how we solve problems for our 10,000+ customers
Inside the SOC
Technical deep dives of cyber incidents and the latest threat trends
Pourquoi Darktrace
La différence Darktrace
Entreprise
À l’intérieur de Darktrace
Notre IA
Nos clients
Reconnaissance du secteur
À propos de nous
Événements
Actualités
Équipe dirigeante
Carrières
Nous contacter
Federal
Centre de confiance

Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for NDR

RSAC 2026: Join Darktrace in San Francisco.
Find out more
Partenaires
Partenaires Darktrace
Partenariats cloud
À l’intérieur de Darktrace
Aperçu
Partenaires technologiques
Portail partenaires
Microsoft
AWS

Discover the value a partnership with Darktrace can bring to you and your customers, as we fundamentally transform your ability to reduce cyber disruption.

Ressources
Blogs
Ressources supplémentaires
Ressource à la une
Le Blog Darktrace

Les dernières tendances et astuces en sécurité

Inside the SOC

Real threats in real environments

Bibliothèque de ressources

Rapports sur les menaces, guides pour CISO, et plus encore

Témoignages clients

10 000 organisations de toutes tailles

Cyber AI Glossary

Un A‑Z de tout ce qui concerne la cybersécurité

Uncover findings from our survey of 1500 cybersecurity professionals on how AI is shaping concerns and priorities

Securing AI in the Enterprise
Take the next step toward securing AI in your environment.
Get a demo
Platform
/ NETWORK

Proactive protection

/ EMAIL

Cloud-native AI security

/ CLOUD

Complete cloud coverage

/ SECURE AI

Deploy agents confidently

/ OT

Comprehensive risk management

/ IDENTITY

360º user protection

/ ENDPOINT

Coverage for every device

/ Proactive Exposure Management
/ Attack Surface Management
/ Forensic Acquisition & Investigation
/ Incident Readiness & Recovery
/ Cyber AI Analyst

Accelerate triage by 10x

Services

Defend with confidence

Integrations

Connect with anything

Darktrace ActiveAI Security Platform™
Spot novel threats across your whole organization.
Solutions
Use cases
Ransomware
Account Takeover
APTs
Insider Threats
Phishing
Supply Chain Attacks
Data Loss
Business Email Compromise
Inside the SOC
Technical deep dives of cyber incidents and the latest threat trends
Why Darktrace
The Darktrace Difference
Our AI
Our Customers
Industry Recognition
About Us
Company
Events
News
Leadership
Careers
Contact Us
Federal
Trust Center
RSAC 2026
Join Darktrace in San Francisco
Partners
Darktrace Partners
Overview
Technology Partners
Partner Portal
Further Partners
Microsoft
AWS
Darktrace Partner Portal
Stronger Together: Defend, Disrupt, Deliver
Resources
Blogs
The Darktrace Blog
Inside the SOC
The Inference
Further Resources
Resource Library
Customer Stories
Cyber AI Glossary
Securing AI in the Enterprise
Take the next step
Get a demo

The Darktrace Blog

Stay ahead of today’s cyber threats

Expert insights and practical guidance to help you strengthen your organization’s cybersecurity in the modern era.

Network
Written by:
Tiana Kelly
|
Mar 17, 2026

When Reality Diverges from the Playbook: Darktrace Identifies Encryption in a World Leaks Ransomware Attack

World Leaks, a rebrand of Hunters International, are known for their extortion-only attack model, abandoning the tactic of file encryption. However, contrary to these claims, Darktrace detected a World Leaks compromise where a ransomware payload was deployed, and customer data was encrypted.
Read more
Network
Written by:
George Kim
|
Mar 10, 2026

NetSupport RAT: How Legitimate Tools Can Be as Damaging as Malware

Read more
Written by:
Nathaniel Bill
|
Mar 4, 2026

Inside Cloud Compromise: Investigating Attacker Activity with Darktrace / Forensic Acquisition & Investigation

Read more
Network
Written by:
Emma Foulger
|
Feb 13, 2026

CVE-2026-1731: How Darktrace Sees the BeyondTrust Exploitation Wave Unfolding

Read more

Most read

Network

Campaign Trail

Written by:
Nathaniel Jones
|
Oct 20, 2025

Salty Much: Darktrace’s view on a recent Salt Typhoon intrusion

Read now

Campaign Trail

Written by:
Tara Gould
|
Jul 10, 2025

Crypto Wallets Continue to be Drained in Elaborate Social Media Scam

Read now
Proactive Security

Industry Insights

Written by:
Nathaniel Jones
|
Jul 2, 2025

Pre-CVE Threat Detection: 10 Examples Identifying Malicious Activity Prior to Public Disclosure of a Vulnerability

Read now

Inside the SOC:
Threat research and real incident analysis

A series exclusively authored by Darktrace’s expert cyber analysts, featuring
technical deep dives into cyber incidents and the latest threat trends.

Nathaniel Bill
|
Mar 4, 2026
Inside Cloud Compromise: Investigating Attacker Activity with Darktrace / Forensic Acquisition & Investigation
Read more
Emma Foulger
|
Feb 13, 2026
CVE-2026-1731: How Darktrace Sees the BeyondTrust Exploitation Wave Unfolding
Read more
Nathaniel Bill
|
Feb 10, 2026
AI/LLM-Generated Malware Used to Exploit React2Shell
Read more
Go Inside the SOC
Newsletter

Stay ahead of threats with the Darktrace blog newsletter

Get the latest insights from the cybersecurity landscape, including threat trends, incident analysis, and the latest Darktrace product developments – delivered directly to your inbox, monthly.

Browse all blogs

Cybersecurity insights for security leaders who can’t afford blind spots.

Topics
Industry
Inside the SOC
Written by:
Nate Bill
|
Jun 15th, 2023

Tracking Diicot: An Emerging Romanian Threat Actor

Written by:
Jack Stockdale OBE FREng
|
Jun 12th, 2023

How Darktrace AI Protects 8,400 Customers

Inside the SOC
Written by:
Sam Lister
|
Jun 5th, 2023

PerfectData Software Abuse and Account Takeover Risks

Written by:
Nabil Zoldjalali
|
May 31st, 2023

Darktrace Enhances Security with Amazon Lake Integration

Inside the SOC
Written by:
The Darktrace Community
|
May 24th, 2023

Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker

Inside the SOC
Written by:
Emily Megan Lim
|
May 23rd, 2023

Darktrace’s Detection of a Hive Ransomware-as-Service

Inside the SOC
Written by:
Zoe Tilsiter
|
May 19th, 2023

Darktrace Stops Large-Scale Account Hijack

OT
Written by:
Max Lesser
|
May 11th, 2023

Securing OT Systems: The Limits of the Air Gap Approach

Email
Written by:
Dan Fein
|
May 9th, 2023

Breaking Down "ICES": An Umbrella Term With Wide Variety

Previous
Show more
32 / 60
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Compliance

Our compliance certifications are also recognized

Get a demo

Featured resource

The State of AI Cybersecurity 2026: Executive Summary

Annual Threat Report 2025

The AI Arsenal: Understanding the Tools Shaping Cybersecurity

Your data. Our AI.
Elevate your cybersecurity with Darktrace AI
Get a demo
Française
English
Française
Deutsch
Español
日本語
English
Française
Deutsch
Español
日本語
Produits
Vue d'ensemble des produits
Plateforme
/NETWORK
/E-MAIL
/CLOUD
/ SECURE AI
/OT
/IDENTITY
/ENDPOINT
Modules complémentaires de plateforme
/Gestion proactive de l'exposition
/Gestion de la surface d'attaque
/ Forensic Acquisition & Investigation
/Préparation aux incidents et reprise
Des services
Vue d'ensemble
L'entreprise
À propos de nous
Contacter
Actualités
Leadership
Investisseurs
CARRIÈRES
Académie
Academy
Fédéral
Trust Center
Légal
Acquisition de Thoma Bravo
Notre IA
Cyber AI 
Centre de Recherche IA
Ressources
Toutes les ressources
Blogue
Clientèle
Portail client
Évènements
L'inférence
À l'intérieur du SOC
Glossaire
PARTENAIRES
Vue d'ensemble des partenaires
Partenaires technologiques
Intégrations
Portail des partenaires
Politique de confidentialitéPolitique en matière de cookiesDéclaration relative à la Loi sur l'esclavage moderneStratégie fiscale publiquePolitique de divulgation des vulnérabilités
Copyright © 2025 Darktrace Holdings Limited. Tous droits réservés.