Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
プラットフォーム
製品
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
包括的なリスク管理
/IDENTITY
360°のユーザー保護
/ENDPOINT
すべてのデバイスのカバレッジ
/プロアクティブ・エクスポージャー・マネジメント
/アタックサーフェス管理
/インシデント対応とリカバリ
Cyber AI Analyst
すべてのアラートを人間のように調査します AIのスピードと規模のアナリスト
Darktrace サービス
グローバルSOCチームによる24時間365日の専門家サポートとインシデント管理により、セキュリティへの投資を最大限に活用できます。
AI Research Centre
リソース
顧客
ブログ
[イベント]
SOC 内部
ザ・インフェレンス
用語集
すべてのリソース
ホワイトペーパー
2024年半期脅威レポート
会社
採用情報
リーダーシップ
ニュース
連邦
投資家
学校
リーガル
SDR Academy
私たちについて
連絡
パートナー
概要
パートナーポータル
テクノロジーパートナー
インテグレーション
注目のパートナー
マイクロソフト
AWS
製品
概要
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
重要なシステムを守る
/IDENTITY
360°のユーザー保護
/ENDPOINT
すべてのデバイスのカバレッジ
/プロアクティブ・エクスポージャー・マネジメント
/アタックサーフェス管理
/インシデント対応とリカバリ
Cyber AI Analyst
サービス
AI Research Centre
リソース
すべてのリソース
顧客
ブログ
[イベント]
ザ・インフェレンス
SOC 内部
用語集
会社
私たちについて
連絡
採用情報
リーダーシップ
ニュース
連邦
学校
SDR Academy
リーガル
パートナー
概要
パートナーポータル
テクノロジーパートナー
パートナーになる
インテグレーション
マイクロソフト
AWS
マクラーレン
デモを申し込む
デモを申し込む
Get a demo
Darktrace Blog
Email
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Rhoncus aenean vel elit scelerisque mauris pellentesque. Sed cras ornare arcu dui vivamus arcu.
Latest Blog Posts
Exploring the Benefits and Risks of Third-Party Data Solutions
Many companies use third-party data management for efficiency, global access, collaboration, and reliability. Find out what those organizations need to know about addressing the security risks and best practices associated with third-party data management.
Stemming the Citrix Bleed Vulnerability with Darktrace’s ActiveAI Security Platform
This blog delves into Darktrace’s investigation into the exploitation of the Citrix Bleed vulnerability on the network of a customer in late 2023. Darktrace’s Self-Learning AI ensured the customer was well equipped to track the post-compromise activity and identify affected devices.
Strategies to Combat Microsoft Teams Phishing Attacks
Join us to learn about the risks of Microsoft Teams phishing and how to implement effective defenses to protect your organization.
Don’t Take the Bait: How Darktrace Keeps Microsoft Teams Phishing Attacks at Bay
In this blog we examine how Darktrace was able to detect and block malicious phishing emails sent via Microsoft Teams that were impersonating an international hotel chain.
Lost in Translation: Darktrace Blocks Non-English Phishing Campaign Concealing Hidden Payloads
This blog explores how Darktrace/Email was able to successfully identify a wave of phishing emails sent from addresses belonging to a major fast-food chain which were leveraged in a coordinated attack. Despite the use of non-English language emails and payloads hidden behind QR codes, Darktrace was able to detect the attack and block the phishing emails in the first instance.
The State of AI in Cybersecurity: The Impact of AI on Cybersecurity Solutions
Part 3: This blog discusses the impact of AI on cybersecurity solutions based on data from Darktrace’s State of AI Cybersecurity Report. Get the latest insights into the evolving challenges faced by organizations, the growing demand for skilled professionals, and the need for integrated security solutions by downloading the full report.
Exploitation of ConnectWise ScreenConnect Vulnerabilities
Uncover the tactics used to exploit ConnectWise vulnerabilities and strategies to protect your systems.
How Empowering End Users can Improve Your Email Security and Decrease the Burden on the SOC
Most email security solutions either assume end-user reporting is of poor quality, so don’t prioritize it, or triage every user-reported email equally without any attempt to improve long-term efficiency. This blog explores how Darktrace aims to improve user reporting from the ground up, reducing the 90% falsely reported phishing and decreasing the load on security teams.
The Rise of Alternative Access in Cloud Attacks
Understand the evolution of cloud-based attacks and the increasing use of alternative methods for initial access in cyber threats.
How Cactus Ransomware Was Detected and Stopped
Discover the tactics used to uncover a Cactus ransomware infection and the implications for cybersecurity defenses.
The State of AI in Cybersecurity: How AI will impact the cyber threat landscape in 2024
Part 2: This blog discusses the impact of AI on the cyber threat landscape based on data from Darktrace’s State of AI Cybersecurity Report. Get the latest insights into the evolving challenges faced by organizations, the growing demand for skilled professionals, and the need for integrated security solutions.
Sliver C2: How Darktrace Provided a Sliver of Hope
Learn how Darktrace is tackling the challenges posed by the Sliver C2 framework and what it means for modern cybersecurity defenses.
The State of AI in Cybersecurity: Unveiling Global Insights from 1,800 Security Practitioners
Part 1: This blog outlines Darktrace’s State of AI Cybersecurity research report, showing key findings from our global survey, covering the impacts AI has on the cyber threat landscape, cyber security solutions, and perceptions and priorities for security practitioners.
Moving Beyond XDR to Achieve True Cyber Resilience with Darktrace ActiveAI Security Platform
Announcing the new Darktrace ActiveAI Security Platform designed to transform security operations. This approach gives security teams unprecedented visibility across any area where Darktrace is deployed, including cloud, email, network, endpoints, and operational technology (OT).
Managing Risk Beyond CVE Scores With the Latest Innovations to Darktrace / OT
Announcing the launch of our new innovation to Darktrace/OT. This industry leading innovation for Darktrace/OT moves beyond CVE scores to redefine vulnerability management for critical infrastructure, tackling the full breadth of risks not limited by traditional controls.
Balada Injector: Darktrace’s Investigation into the Malware Exploiting WordPress Vulnerabilities
This blog explores Darktrace’s detection of Balada Injector, a malware known to exploit vulnerabilities in WordPress to gain unauthorized access to networks. Darktrace was able to define numerous use-cases within customer environments which followed previously identified patterns of activity spikes across multiple weeks.
Looking Beyond Secure Email Gateways with the Latest Innovations to Darktrace / EMAIL
In 2024, email security challenges have evolved far beyond inbound attacks, as cyber attackers increasingly leverage AI and employ multi-vector techniques that penetrate every facet of organizational communication. Read how the largest ever update to Darktrace / EMAIL introduces new innovations designed to address the nature of modern email threats.
Darktrace's Investigation of Raspberry Robin Worm
Discover how Darktrace is leading the hunt for Raspberry Robin. Explore early insights and strategies in the battle against cyber threats.
Enhancing Cloud Security with Business Context
Discover cloud migration insights, security challenges, best practices, and Darktrace's unique approach to enhancing cloud visibility and risk management.
What are Botnets and How Darktrace Uncovers Them
Learn how Darktrace detected and implemented defense protocols against Socks5Systemz botnet before any threat to intelligence had been published.
Previous
Next