Darktrace annonce son intention d'acquérir Cado Security.
Lire le communiqué de presse
Plateforme
Produits
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Gestion complète des risques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion de la surface d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Enquête sur chaque alerte comme un humain analyste, à la vitesse et à l'échelle de l'IA
Services Darktrace
Optimisez vos investissements en matière de sécurité grâce à l'assistance d'experts 24h/24 et 7j/7 et à la gestion des incidents assurée par notre équipe SOC mondiale.
Our AI
Ressources
Clientèle
Blogue
Évènements
À l'intérieur du SOC
L'inférence
Glossaire
Toutes les ressources
Livre blanc
Rapport semestriel sur les menaces 2024
L'entreprise
CARRIÈRES
Leadership
Actualités
Fédéral
Investisseurs
Académie
Légal
SDR Academy
À propos de nous
Contacter
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Intégrations
Partenaires en vedette
Microsoft
AWS
McLaren
Produits
Vue d'ensemble
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Défendez les systèmes critiques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion des surfaces d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Des services
Centre de Recherche IA
Ressources
Toutes les ressources
Clientèle
Blogue
Évènements
L'inférence
À l'intérieur du SOC
Glossaire
L'entreprise
À propos de nous
Contacter
CARRIÈRES
Leadership
Actualités
Fédéral
Académie
SDR Academy
Légal
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Devenez partenaire
Intégrations
Microsoft
AWS
McLaren
OBTENIR UNE DÉMO
OBTENIR UNE DÉMO
Get a demo
Darktrace / Network blog
Across the network
Darktrace / Network is in action all over the globe. Learn more about what’s behind it from Darktrace experts.
Derniers articles de blog
Blog
Unveiling ViperSoftX: A Darktrace Investigation
Read about the ViperSoftX threat and how Darktrace's innovative detection methods exposed this cyber intrusion and its potential impacts.
Blog
How Darktrace Detected Black Basta Ransomware
Discover how Darktrace uncovered Black Basta ransomware. Learn about its tactics, techniques, and how to protect your network from this threat.
Blog
How Darktrace Stopped Akira Ransomware
Learn how Darktrace is uniquely placed to identify and contain the novel Akira ransomware strain, first observed in March 2023.
Blog
The Rise of MaaS & Lumma Info Stealer
Discover the rise of the Lumma info stealer and its implications for cybersecurity. Learn how this malware targets sensitive information.
Blog
Darktrace’s Detection of Unattributed Ransomware
Leveraging anomaly-based detection, we successfully identified an ongoing ransomware attack on the network of a customer and the activity that preceded it.
Blog
Successfully Containing an Admin Credential Attack
Discover how Darktrace's anomaly-based threat detection thwarted a cyber-attack on a customer's network, stopping a malicious actor in their tracks.
Blog
Darktrace's Detection of Ransomware & Syssphinx
Read how Darktrace identified an attack technique by the threat group, Syssphinx. Learn how Darktrace's quick identification process can spot a threat.
Blog
Revealing Outlaw's Returning Features & New Tactics
Darktrace's investigation of the latest Outlaw crypto-mining operation, covering the resurgence of old tactics along with the emergence of new ones.
Blog
How Darktrace Quickly Foiled An Information Stealer
Discover how Darktrace thwarted the CryptBot malware in just 2 seconds. Learn about this fast-moving threat and the defense strategies employed.
Blog
Darktrace Detection of 3CX Supply Chain Attack
Explore how the 3CX supply chain compromise was uncovered, revealing key insights into the detection of sophisticated cyber threats.
Blog
Darktrace’s Detection of a Hive Ransomware-as-Service
This blog investigates a new strain of ransomware, Hive, a ransomware-as-a-service. Darktrace was able to provide full visibility over the attacks.
Blog
Gozi ISFB Malware Detection Insights and Analysis
Uncover how Gozi ISFB operates and how Darktrace’s detection capabilities help secure your systems against this versatile malware.
Blog
Understanding Qakbot Infections and Attack Paths
Explore the network-based analysis of Qakbot infections with Darktrace. Learn about the various attack paths used by cybercriminals and Darktrace's response.
Blog
Amadey Info Stealer and N-Day Vulnerabilities
Understand the implications of the Amadey info stealer on cybersecurity and how it exploits N-day vulnerabilities for data theft.
Blog
Protecting Yourself from Laplas Clipper Crypto Theives
Explore strategies to combat Laplas Clipper attacks and enhance your defenses against cryptocurrency theft in the digital landscape.
Blog
Prevent Cryptojacking Attacks with Darktrace AI Technology
Protect your business from cryptojackers with Darktrace AI! Discover how your business can benefit round-the-clock defense with AI Cybersecurity.
Blog
Vidar Network: Analyzing a Prolific Info Stealer
Discover the latest insights on the Vidar network-based info stealer from our Darktrace experts and stay informed on cybersecurity threats.
Blog
Qakbot Resurgence in the Cyber Landscape
Stay informed on the evolving threat Qakbot. Protect yourself from the Qakbot resurgence! Learn more from our Darktrace AI Cybersecurity experts!
Blog
How Vidar Malware Spreads via Malvertising on Google
Discover how Vidar info stealer malware is distributed through malvertising on Google and the risks it poses to users and organizations.
Blog
BlackMatter's Smash-and-Grab Ransom Attack Incident Analysis
Stay informed on cybersecurity trends! Read about a BlackMatters ransom attack incident and Darktrace's analysis on how RESPOND could have stopped the attack.
Previous
Next
Cas d'utilisation
Blogue
Témoignages clients
Intégrations
OBTENIR UNE DÉMO