プラットフォーム
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
包括的リスク管理
/IDENTITY
360°ユーザーを守る
/ENDPOINT
あらゆるデバイスに対するカバレッジ
/ Proactive Exposure Management
/ Attack Surface Management
/ Forensic Acquisition & Investigation
/ Incident Readiness & Recovery
Cyber AI Analyst
すべてのアラートをAIのスピードとスケールで人間のアナリストのように調査
Darktrace Services
ダークトレースのグローバルSOCが提供する、エキスパートによる24時間、週7日のサポートおよびインシデント管理により、セキュリティへの投資を最大限に生かすことができます
ユースケース
Darktrace がいかにしてあらゆる攻撃ベクトルを守るかをご覧ください
Ransomware
新しい脅威を初めて阻止
Phishing
攻撃を 13 日前に阻止
アカウント乗っ取り
ユーザーを保護しましょう
サプライチェーン攻撃
すべての接続を保護
APTs
最も巧妙な攻撃を阻止
データロス
データを保護する
インサイダー脅威
危険な行動を特定
ビジネスEmail 詐欺
受信箱を超えた保護
顧客事例
あらゆる規模の組織向けのセキュリティ
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
ダークトレースのAI
リソース
導入企業
ブログ
イベント
Inside the SOC
The Inference
用語集
すべてのリソース
ホワイトペーパー
多層的AI 装備:サイバーセキュリティを構成するツールを理解する
企業情報
キャリア
経営陣
ニュース
米国連邦政府向け
IR情報
Darktraceアカデミー
法務
SDRアカデミー
ダークトレースについて
お問い合わせ
パートナー
概要
テクノロジーパートナー
インテグレーション
パートナーシップ紹介
マイクロソフト
AWS
製品
概要
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
重要なシステムを守る
/IDENTITY
360°のユーザー保護
/ENDPOINT
すべてのデバイスのカバレッジ
/プロアクティブ・エクスポージャー・マネジメント
/アタックサーフェス管理
/インシデント対応とリカバリ
Cyber AI Analyst
サービス
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
AI Research Centre
リソース
すべてのリソース
顧客
ブログ
[イベント]
ザ・インフェレンス
SOC 内部
用語集
会社
私たちについて
連絡
採用情報
リーダーシップ
ニュース
連邦
学校
SDR Academy
リーガル
パートナー
概要
パートナーポータル
テクノロジーパートナー
パートナーになる
インテグレーション
マイクロソフト
AWS
マクラーレン
デモを申し込む
デモを申し込む
Get a demo
Darktrace Blog
Inside the SOC
A series exclusively authored by Darktrace's expert cyber analysts, containing technical deep dives of cyber incidents and the latest threat trends.
Latest Blog Posts
Darktrace: Microsoft UK Partner of the Year 2024
Darktrace continues to innovate with Microsoft in the shared mission to deliver proactive cyber protection tailored to every organization. Joint customers benefit from two distinct, complementary security approaches – combining large scale threat intelligence with enterprise-native security insights – to address the full range of email threats.
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer
P2Pinfect, a sophisticated Rust-based malware, has evolved from a dormant spreading botnet to actively deploying ransomware and a cryptominer, primarily infecting Redis servers and using a P2P C2. The updated version includes a user-mode rootkit, but its ransomware impact is limited by the low privileges often associated with Redis.
Following up on our Conversation: Detecting & Containing a LinkedIn Phishing Attack with Darktrace
Darktrace/Email detected a phishing attack that had originated from LinkedIn, where the attacker impersonated a well known construction company to conduct a credential harvesting attack on the target. Darktrace’s ActiveAI Security Platform played a critical role in investigating the activity and initiating real-time responses that were outside the physical capability of human security teams.
Let the Dominos Fall! SOC and IR Metrics for ROI
Vendors are scrambling to compare MTTD metrics laid out in the latest MITRE Engenuity ATT&CK® Evaluations. But this analysis is reductive, ignoring the fact that in cybersecurity, there are far more metrics that matter.
Elevating Network Security: Confronting Trust, Ransomware, & Novel Attacks
Ensuring trust, battling ransomware, and detecting novel attacks pose critical challenges in network security. This blog explores these challenges and shows how leveraging AI-driven security solutions helps security teams stay informed and effectively safeguard their network.
Post-Exploitation Activities on PAN-OS Devices: A Network-Based Analysis
This blog investigates the network-based activity detected by Darktrace in compromises stemming from the exploitation of a vulnerability in Palo Alto Networks firewall devices, namely CVE-2024-3400.
Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windows
Cado Security Labs (now part of Darktrace) identified a "Meeten" campaign deploying a cross-platform (macOS/Windows) infostealer called Realst. Threat actors create fake Web3 companies with AI-generated content and social media to trick targets into downloading malicious meeting applications.
Safeguarding Distribution Centers in the Digital Age
With complex digital and physical systems, that are increasingly interconnected, the expanding attack surface calls for a unified security solution. Explore the challenges, risks, and potential solutions for organizations aiming at securing distribution centers from cyber threats.
Darktrace Investigation Into Medusa Ransomware
See how Darktrace empowers organizations to fight back against Medusa ransomware, enhancing their cybersecurity posture with advanced technology.
The Price of Admission: Countering Stolen Credentials with Darktrace
This blog examines a network compromise that stemmed from the purchase of leaked credentials from the dark web. Credentials purchased from dark web marketplaces allow unauthorized access to internal systems. Such access can be used to exfiltrate data, disrupt operations, or deploy malware.
Spinning YARN: A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence
Cado Security labs researchers (now part of Darktrace) encountered a Linux malware campaign, "Spinning YARN," that targets Docker, Apache Hadoop, Redis, and Confluence. This campaign exploits vulnerabilities in these widely used platforms to gain access.
Exploring the Benefits and Risks of Third-Party Data Solutions
Many companies use third-party data management for efficiency, global access, collaboration, and reliability. Find out what those organizations need to know about addressing the security risks and best practices associated with third-party data management.
Stemming the Citrix Bleed Vulnerability with Darktrace’s ActiveAI Security Platform
This blog delves into Darktrace’s investigation into the exploitation of the Citrix Bleed vulnerability on the network of a customer in late 2023. Darktrace’s Self-Learning AI ensured the customer was well equipped to track the post-compromise activity and identify affected devices.
Strategies to Combat Microsoft Teams Phishing Attacks
Join us to learn about the risks of Microsoft Teams phishing and how to implement effective defenses to protect your organization.
Don’t Take the Bait: How Darktrace Keeps Microsoft Teams Phishing Attacks at Bay
In this blog we examine how Darktrace was able to detect and block malicious phishing emails sent via Microsoft Teams that were impersonating an international hotel chain.
Lost in Translation: Darktrace Blocks Non-English Phishing Campaign Concealing Hidden Payloads
This blog explores how Darktrace/Email was able to successfully identify a wave of phishing emails sent from addresses belonging to a major fast-food chain which were leveraged in a coordinated attack. Despite the use of non-English language emails and payloads hidden behind QR codes, Darktrace was able to detect the attack and block the phishing emails in the first instance.
The State of AI in Cybersecurity: The Impact of AI on Cybersecurity Solutions
Part 3: This blog discusses the impact of AI on cybersecurity solutions based on data from Darktrace’s State of AI Cybersecurity Report. Get the latest insights into the evolving challenges faced by organizations, the growing demand for skilled professionals, and the need for integrated security solutions by downloading the full report.
Exploitation of ConnectWise ScreenConnect Vulnerabilities
Uncover the tactics used to exploit ConnectWise vulnerabilities and strategies to protect your systems.
How Empowering End Users can Improve Your Email Security and Decrease the Burden on the SOC
Most email security solutions either assume end-user reporting is of poor quality, so don’t prioritize it, or triage every user-reported email equally without any attempt to improve long-term efficiency. This blog explores how Darktrace aims to improve user reporting from the ground up, reducing the 90% falsely reported phishing and decreasing the load on security teams.
The Rise of Alternative Access in Cloud Attacks
Understand the evolution of cloud-based attacks and the increasing use of alternative methods for initial access in cyber threats.
Previous
Next