Darktrace has completed the acquisition of Cado Security.
Read the announcement press release here
Platform
Products
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Comprehensive risk management
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber AI Analyst
Investigates every alert like a human analyst, at the speed and scale of AI
Darktrace Services
Maximize your security investments with 24/7 expert support and incident management from our global SOC team.
Our AI
Resources
Customers
Blog
Events
Inside the SOC
The Inference
Glossary
All resources
White paper
The AI Arsenal: Understanding the Tools Shaping Cybersecurity
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partners
Overview
Partner Portal
Technology Partners
Integrations
Featured Partners
Microsoft
AWS
Mclaren
Products
Overview
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Defend critical systems
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/Proactive Exposure Management
/Attack Surface Management
/Incident Readiness & Recovery
Cyber AI Analyst
Services
Our AI
Resources
All Resources
Customers
Blog
Events
The Inference
Inside the SOC
Glossary
Company
About us
Contact
Careers
Leadership
News
Federal
Academy
SDR Academy
Legal
Partners
Overview
Partner Portal
Technology Partners
Become a Partner
Integrations
Microsoft
AWS
Mclaren
Get a demo
Get a demo
Get a demo
Darktrace / Network blog
Across the network
Darktrace / Network is in action all over the globe. Learn more about what’s behind it from Darktrace experts.
Latest Blog Posts
Blog
FortiClient EMS Exploited: Attack Chain & Post Exploitation Tactics
Read about the methods used to exploit FortiClient EMS and the critical post-exploitation tactics that affect cybersecurity defenses.
Blog
Decrypting the Matrix: How Darktrace Uncovered a KOK08 Ransomware Attack
In May 2024, a Darktrace customer was affected by KOK08, a ransomware strain commonly used by the Matrix ransomware family. Learn more about the tactics used by this ransomware case, including double extortion, and how Darktrace is able to detect and respond to such threats.
Blog
How Darktrace Detects TeamCity Exploitation Activity
Darktrace observed the rapid exploitation of a critical vulnerability in JetBrains TeamCity (CVE-2024-27198) shortly following its public disclosure. Learn how the need for speedy detection serves to protect against supply chain attacks.
Blog
Investigating the Adaptive Jupyter Information Stealer
Find out how to safeguard your organization from the Jupyter information stealer with strategies revealed by Darktrace's in-depth investigation.
Blog
Qilin Ransomware: Detection and Analysis
Get insights into the detection of Qilin ransomware operations and how organizations can protect themselves from this threat.
Blog
Elevating Network Security: Confronting Trust, Ransomware, & Novel Attacks
Ensuring trust, battling ransomware, and detecting novel attacks pose critical challenges in network security. This blog explores these challenges and shows how leveraging AI-driven security solutions helps security teams stay informed and effectively safeguard their network.
Blog
Post-Exploitation Activities on PAN-OS Devices: A Network-Based Analysis
This blog investigates the network-based activity detected by Darktrace in compromises stemming from the exploitation of a vulnerability in Palo Alto Networks firewall devices, namely CVE-2024-3400.
Blog
Darktrace Investigation Into Medusa Ransomware
See how Darktrace empowers organizations to fight back against Medusa ransomware, enhancing their cybersecurity posture with advanced technology.
Blog
The Price of Admission: Countering Stolen Credentials with Darktrace
This blog examines a network compromise that stemmed from the purchase of leaked credentials from the dark web. Credentials purchased from dark web marketplaces allow unauthorized access to internal systems. Such access can be used to exfiltrate data, disrupt operations, or deploy malware.
Blog
Exploitation of ConnectWise ScreenConnect Vulnerabilities
Uncover the tactics used to exploit ConnectWise vulnerabilities and strategies to protect your systems.
Blog
How Cactus Ransomware Was Detected and Stopped
Discover the tactics used to uncover a Cactus ransomware infection and the implications for cybersecurity defenses.
Blog
Sliver C2: How Darktrace Provided a Sliver of Hope
Learn how Darktrace is tackling the challenges posed by the Sliver C2 framework and what it means for modern cybersecurity defenses.
Blog
Balada Injector: Darktrace’s Investigation into the Malware Exploiting WordPress Vulnerabilities
This blog explores Darktrace’s detection of Balada Injector, a malware known to exploit vulnerabilities in WordPress to gain unauthorized access to networks. Darktrace was able to define numerous use-cases within customer environments which followed previously identified patterns of activity spikes across multiple weeks.
Blog
Darktrace's Investigation of Raspberry Robin Worm
Discover how Darktrace is leading the hunt for Raspberry Robin. Explore early insights and strategies in the battle against cyber threats.
Blog
What are Botnets and How Darktrace Uncovers Them
Learn how Darktrace detected and implemented defense protocols against Socks5Systemz botnet before any threat to intelligence had been published.
Blog
Pikabot Malware: Insights, Impact, & Attack Analysis
Learn about Pikabot malware and its rapid evolution in the wild, impacting organizations and how to defend against this growing threat.
Blog
Simulated vs. Real Malware: What You Need To Know
Learn how Darktrace distinguishes between simulated and real malware. Discover the advanced detection techniques used to protect your network.
Blog
Protecting Against AlphV BlackCat Ransomware
Learn how Darktrace AI is combating AlphV BlackCat ransomware, including the details of this ransomware and how to protect yourself from it.
Blog
Quasar Remote Access Tool and Its Security Risks
Discover how the Quasar remote access tool can become a vulnerability in the wrong hands and strategies to mitigate these risks.
Blog
Detecting & Containing Gootloader Malware
Learn how Darktrace helps detect and contain multi-functional threats like the Gootloader malware. Stay ahead of cyber threats with Darktrace AI solutions.
Previous
Next
Use cases
Blog
Customer stories
Integrations
Get a demo