Darktrace annonce son intention d'acquérir Cado Security.
Lire le communiqué de presse
Plateforme
Produits
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Gestion complète des risques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion de la surface d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Enquête sur chaque alerte comme un humain analyste, à la vitesse et à l'échelle de l'IA
Services Darktrace
Optimisez vos investissements en matière de sécurité grâce à l'assistance d'experts 24h/24 et 7j/7 et à la gestion des incidents assurée par notre équipe SOC mondiale.
Our AI
Ressources
Clientèle
Blogue
Évènements
À l'intérieur du SOC
L'inférence
Glossaire
Toutes les ressources
Livre blanc
Rapport semestriel sur les menaces 2024
L'entreprise
CARRIÈRES
Leadership
Actualités
Fédéral
Investisseurs
Académie
Légal
SDR Academy
À propos de nous
Contacter
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Intégrations
Partenaires en vedette
Microsoft
AWS
Produits
Vue d'ensemble
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Défendez les systèmes critiques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion des surfaces d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Des services
Centre de Recherche IA
Ressources
Toutes les ressources
Clientèle
Blogue
Évènements
L'inférence
À l'intérieur du SOC
Glossaire
L'entreprise
À propos de nous
Contacter
CARRIÈRES
Leadership
Actualités
Fédéral
Académie
SDR Academy
Légal
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Devenez partenaire
Intégrations
Microsoft
AWS
McLaren
OBTENIR UNE DÉMO
OBTENIR UNE DÉMO
Get a demo
Darktrace Blog
RESPOND
Hear from Darktrace in-house experts and customers on real-world applications of Autonomous Response that can take targeted action to contain cyber-threats.
Latest Blog Posts
Understanding the WarmCookie Backdoor Threat
Discover effective strategies for disarming the WarmCookie backdoor and securing your systems against this persistent threat.
The State of AI in Cybersecurity: Understanding AI Technologies
Part 4: This blog explores the findings from Darktrace’s State of AI Cybersecurity Report on security professionals' understanding of the different types of AI used in security programs. Get the latest insights into the evolving challenges, growing demand for skilled professionals, and the need for integrated security solutions by downloading the full report.
Investigating the Adaptive Jupyter Information Stealer
Find out how to safeguard your organization from the Jupyter information stealer with strategies revealed by Darktrace's in-depth investigation.
What you need to know about the new SEC Cybersecurity rules
In July 2023, the U.S. Securities and Exchange Commission (SEC) adopted new rules concerning cybersecurity incidents and disclosures. This blog describes the new rules and demonstrates how Darktrace can help organizations achieve compliance with these standards.
How Darktrace Detects NTLM Hash Theft
Explore Darktrace's innovative methods for detecting NTLM hash theft and safeguarding your organization from cyber threats.
Qilin Ransomware: Detection and Analysis
Get insights into the detection of Qilin ransomware operations and how organizations can protect themselves from this threat.
Darktrace: Microsoft UK Partner of the Year 2024
Darktrace continues to innovate with Microsoft in the shared mission to deliver proactive cyber protection tailored to every organization. Joint customers benefit from two distinct, complementary security approaches – combining large scale threat intelligence with enterprise-native security insights – to address the full range of email threats.
Following up on our Conversation: Detecting & Containing a LinkedIn Phishing Attack with Darktrace
Darktrace/Email detected a phishing attack that had originated from LinkedIn, where the attacker impersonated a well known construction company to conduct a credential harvesting attack on the target. Darktrace’s ActiveAI Security Platform played a critical role in investigating the activity and initiating real-time responses that were outside the physical capability of human security teams.
Let the Dominos Fall! SOC and IR Metrics for ROI
Vendors are scrambling to compare MTTD metrics laid out in the latest MITRE Engenuity ATT&CK® Evaluations. But this analysis is reductive, ignoring the fact that in cybersecurity, there are far more metrics that matter.
Elevating Network Security: Confronting Trust, Ransomware, & Novel Attacks
Ensuring trust, battling ransomware, and detecting novel attacks pose critical challenges in network security. This blog explores these challenges and shows how leveraging AI-driven security solutions helps security teams stay informed and effectively safeguard their network.
Post-Exploitation Activities on PAN-OS Devices: A Network-Based Analysis
This blog investigates the network-based activity detected by Darktrace in compromises stemming from the exploitation of a vulnerability in Palo Alto Networks firewall devices, namely CVE-2024-3400.
Safeguarding Distribution Centers in the Digital Age
With complex digital and physical systems, that are increasingly interconnected, the expanding attack surface calls for a unified security solution. Explore the challenges, risks, and potential solutions for organizations aiming at securing distribution centers from cyber threats.
Darktrace Investigation Into Medusa Ransomware
See how Darktrace empowers organizations to fight back against Medusa ransomware, enhancing their cybersecurity posture with advanced technology.
The Price of Admission: Countering Stolen Credentials with Darktrace
This blog examines a network compromise that stemmed from the purchase of leaked credentials from the dark web. Credentials purchased from dark web marketplaces allow unauthorized access to internal systems. Such access can be used to exfiltrate data, disrupt operations, or deploy malware.
Exploring the Benefits and Risks of Third-Party Data Solutions
This blog discusses why companies use third-party data management for efficiency, global access, collaboration, and reliability, while also addressing security risks associated and best practices with third-party data management.
Stemming the Citrix Bleed Vulnerability with Darktrace’s ActiveAI Security Platform
This blog delves into Darktrace’s investigation into the exploitation of the Citrix Bleed vulnerability on the network of a customer in late 2023. Darktrace’s Self-Learning AI ensured the customer was well equipped to track the post-compromise activity and identify affected devices.
Strategies to Combat Microsoft Teams Phishing Attacks
Join us to learn about the risks of Microsoft Teams phishing and how to implement effective defenses to protect your organization.
Don’t Take the Bait: How Darktrace Keeps Microsoft Teams Phishing Attacks at Bay
In this blog we examine how Darktrace was able to detect and block malicious phishing emails sent via Microsoft Teams that were impersonating an international hotel chain.
Lost in Translation: Darktrace Blocks Non-English Phishing Campaign Concealing Hidden Payloads
This blog explores how Darktrace/Email was able to successfully identify a wave of phishing emails sent from addresses belonging to a major fast-food chain which were leveraged in a coordinated attack. Despite the use of non-English language emails and payloads hidden behind QR codes, Darktrace was able to detect the attack and block the phishing emails in the first instance.
The State of AI in Cybersecurity: The Impact of AI on Cybersecurity Solutions
Part 3: This blog discusses the impact of AI on cybersecurity solutions based on data from Darktrace’s State of AI Cybersecurity Report. Get the latest insights into the evolving challenges faced by organizations, the growing demand for skilled professionals, and the need for integrated security solutions by downloading the full report.
Previous
Next