New Innovations in Agentic AI for Cross-Domain Defense: Register for the Live Launch Event
プラットフォーム
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
包括的リスク管理
/IDENTITY
360°ユーザーを守る
/ENDPOINT
あらゆるデバイスに対するカバレッジ
/ Proactive Exposure Management
/ Attack Surface Management
/ Forensic Acquisition & Investigation
/ Incident Readiness & Recovery
Cyber AI Analyst
すべてのアラートをAIのスピードとスケールで人間のアナリストのように調査
Darktrace Services
ダークトレースのグローバルSOCが提供する、エキスパートによる24時間、週7日のサポートおよびインシデント管理により、セキュリティへの投資を最大限に生かすことができます
ユースケース
Darktrace がいかにしてあらゆる攻撃ベクトルを守るかをご覧ください
Ransomware
新しい脅威を初めて阻止
Phishing
攻撃を 13 日前に阻止
アカウント乗っ取り
ユーザーを保護しましょう
サプライチェーン攻撃
すべての接続を保護
APTs
最も巧妙な攻撃を阻止
データロス
データを保護する
インサイダー脅威
危険な行動を特定
ビジネスEmail 詐欺
受信箱を超えた保護
顧客事例
あらゆる規模の組織向けのセキュリティ
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
ダークトレースのAI
リソース
導入企業
ブログ
イベント
Inside the SOC
The Inference
用語集
すべてのリソース
ホワイトペーパー
多層的AI 装備:サイバーセキュリティを構成するツールを理解する
企業情報
キャリア
経営陣
ニュース
米国連邦政府向け
IR情報
Darktraceアカデミー
法務
SDRアカデミー
ダークトレースについて
お問い合わせ
パートナー
概要
テクノロジーパートナー
インテグレーション
パートナーシップ紹介
マイクロソフト
AWS
製品
概要
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
重要なシステムを守る
/IDENTITY
360°のユーザー保護
/ENDPOINT
すべてのデバイスのカバレッジ
/プロアクティブ・エクスポージャー・マネジメント
/アタックサーフェス管理
/インシデント対応とリカバリ
Cyber AI Analyst
サービス
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
AI Research Centre
リソース
すべてのリソース
顧客
ブログ
[イベント]
ザ・インフェレンス
SOC 内部
用語集
会社
私たちについて
連絡
採用情報
リーダーシップ
ニュース
連邦
学校
SDR Academy
リーガル
パートナー
概要
パートナーポータル
テクノロジーパートナー
パートナーになる
インテグレーション
マイクロソフト
AWS
マクラーレン
デモを申し込む
デモを申し込む
Get a demo
Darktrace / Network blog
Across the network
Darktrace / Network is in action all over the globe. Learn more about what’s behind it from Darktrace experts.
Latest Blog Posts
Blog
Darktrace Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Darktrace announces its Leader position in the inaugural Gartner® Magic Quadrant™ for Network Detection and Response (NDR).
Blog
PumaBot: Novel Botnet Targeting IoT Surveillance Devices
Darktrace investigated “PumaBot,” a Go-based Linux botnet targeting IoT devices. It avoids internet-wide scanning, instead using a C2 server to get targets and brute-force SSH credentials. Once inside, it executes remote commands and ensures persistence.
Blog
Defending the Frontlines: Proactive Cybersecurity in Local Government
To quickly identify and respond to threats before damage occurs, this local government relies on Darktrace to improve network visibility, stop insider threats, protect its email systems, and accelerate incident investigations.
Blog
Catching a RAT: How Darktrace Neutralized AsyncRAT
Darktrace's AI-driven tools identified and disrupted AsyncRAT activity, detecting suspicious connections and blocking them autonomously. This proactive response prevented the compromise from escalating and safeguarded sensitive data from exfiltration.
Blog
Anomaly-Based Threat Hunting: Darktrace's Approach in Action
This blog outlines Darktrace's model-based anomaly detection and how security teams can leverage custom models for targeted threat hunts. Recently, Darktrace's Threat Research team applied this method in their report, "AI & Cybersecurity: The State of Cyber in UK and US Energy Sectors."
Blog
SocGholish: From loader and C2 activity to RansomHub deployment
In early 2025, Darktrace uncovered SocGholish-to-RansomHub intrusion chains, including loader and C2 activity, alongside credential harvesting via WebDAV and SCF abuse. Learn more about SocGholish and its kill chain here!
Blog
Your Vendors, Your Risk: Rethinking Third-Party Security in the Age of Supply Chain Attacks
Protecting against supply chain cyber-attacks means safeguarding not just your network, but your customers’ trust. Learn why securing vendor relationships is essential in today’s threat landscape.
Blog
Boosting Security with Azure Virtual Network TAP Traffic Mirroring
Discover why Darktrace is a launch partner for the Public Preview of Microsoft Azure Virtual Network Terminal Access Point (TAP).
Blog
The Importance of NDR in Resilient XDR
Learn why EDR alone is not enough and how NDR uncovers and stops threats that disable or bypass endpoint security.
Blog
Obfuscation Overdrive: Next-Gen Cryptojacking with Layers
Docker is a prime target for malware, with new strains emerging daily. This blog explores a novel campaign showcasing advanced obfuscation and cryptojacking techniques.
Blog
How NDR and Secure Access Service Edge (SASE) Work Together to Achieve Network Security Outcomes
Learn how NDR and SASE solutions complement and interact with each other to create a robust network security strategy.
Blog
Cyberhaven Supply Chain Attack: Exploiting Browser Extensions
In late 2024, Darktrace detected unusual activity linked to Cyberhaven's Chrome browser extension. Read more about Darktrace’s investigation here.
Blog
Darktrace's Detection of State-Linked ShadowPad Malware
In 2024, Darktrace identified a cluster of intrusions involving the state-linked malware, ShadowPad. This blog will detail ShadowPad and the associated activities detected by Darktrace.
Blog
Darktrace Releases Annual 2024 Threat Insights
Explore Darktrace's Annual Threat Report 2024 for insights on the latest cyber threats and trends observed throughout the year.
Blog
Defending Against Living-off-the-Land Attacks: Anomaly Detection in Action
Discover how Darktrace detected and responded to cyberattacks using Living-off-the-Land (LOTL) tactics to exploit trusted services and tools on customer networks.
Blog
RansomHub Revisited: New Front-Runner in the Ransomware-as-a-Service Marketplace
Discover how RansomHub is rising in the ransomware landscape, using tools like Atera and Splashtop, reconnaissance tactics, and double extortion techniques.
Blog
Reimagining Your SOC: Unlocking a Proactive State of Security
Reimagining your SOC Part 3/3: This blog explores the challenges security professionals face in managing cyber risk, evaluates current market solutions, and outlines strategies for building a proactive security posture.
Blog
Reimagining Your SOC: How to Shift Away From Reactive Network Security
Reimagining your SOC Part 1/3: This blog shows how security teams can move to autonomous detection and investigation of novel threats, reducing alert fatigue, and enabling tailored, real-time threat response.
Blog
RansomHub Ransomware: Darktrace’s Investigation of the Newest Tool in ShadowSyndicate's Arsenal
Between September and October 2024, Darktrace investigated several customer networks compromised by RansomHub attacks. Further analysis revealed a connection to the ShadowSyndicate threat group. Read on to discover how these entities are linked and the tactics, techniques, and procedures employed in these attacks.
Blog
Cleo File Transfer Vulnerability: Patch Pitfalls and Darktrace’s Detection of Post-Exploitation Activities
File transfer applications are prime targets for ransomware groups due to their critical role in business operations. Recent vulnerabilities in Cleo's MFT software, namely CVE-2024-50623 and CVE-2024-55956, highlight ongoing risks. Read more about the Darktrace Threat Research team’s investigation into these vulnerabilities.
Previous
Next
ユースケース
ブログ
顧客事例
インテグレーション
デモを申し込む