Darktrace has completed the acquisition of Cado Security.
Read the announcement press release here
Platform
Products
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Comprehensive risk management
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber AI Analyst
Investigates every alert like a human analyst, at the speed and scale of AI
Darktrace Services
Maximize your security investments with 24/7 expert support and incident management from our global SOC team.
Our AI
Resources
Customers
Blog
Events
Inside the SOC
The Inference
Glossary
All resources
White paper
The AI Arsenal: Understanding the Tools Shaping Cybersecurity
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partners
Overview
Partner Portal
Technology Partners
Integrations
Featured Partners
Microsoft
AWS
Mclaren
Products
Overview
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Defend critical systems
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/Proactive Exposure Management
/Attack Surface Management
/Incident Readiness & Recovery
Cyber AI Analyst
Services
Our AI
Resources
All Resources
Customers
Blog
Events
The Inference
Inside the SOC
Glossary
Company
About us
Contact
Careers
Leadership
News
Federal
Academy
SDR Academy
Legal
Partners
Overview
Partner Portal
Technology Partners
Become a Partner
Integrations
Microsoft
AWS
Mclaren
Get a demo
Get a demo
Get a demo
Darktrace / Network blog
Across the network
Darktrace / Network is in action all over the globe. Learn more about what’s behind it from Darktrace experts.
Latest Blog Posts
Blog
Revealing Outlaw's Returning Features & New Tactics
Darktrace's investigation of the latest Outlaw crypto-mining operation, covering the resurgence of old tactics along with the emergence of new ones.
Blog
How Darktrace Quickly Foiled An Information Stealer
Discover how Darktrace thwarted the CryptBot malware in just 2 seconds. Learn about this fast-moving threat and the defense strategies employed.
Blog
Darktrace Detection of 3CX Supply Chain Attack
Explore how the 3CX supply chain compromise was uncovered, revealing key insights into the detection of sophisticated cyber threats.
Blog
Darktrace’s Detection of a Hive Ransomware-as-Service
This blog investigates a new strain of ransomware, Hive, a ransomware-as-a-service. Darktrace was able to provide full visibility over the attacks.
Blog
Gozi ISFB Malware Detection Insights and Analysis
Uncover how Gozi ISFB operates and how Darktrace’s detection capabilities help secure your systems against this versatile malware.
Blog
Understanding Qakbot Infections and Attack Paths
Explore the network-based analysis of Qakbot infections with Darktrace. Learn about the various attack paths used by cybercriminals and Darktrace's response.
Blog
Amadey Info Stealer and N-Day Vulnerabilities
Understand the implications of the Amadey info stealer on cybersecurity and how it exploits N-day vulnerabilities for data theft.
Blog
Protecting Yourself from Laplas Clipper Crypto Theives
Explore strategies to combat Laplas Clipper attacks and enhance your defenses against cryptocurrency theft in the digital landscape.
Blog
Prevent Cryptojacking Attacks with Darktrace AI Technology
Protect your business from cryptojackers with Darktrace AI! Discover how your business can benefit round-the-clock defense with AI Cybersecurity.
Blog
Vidar Network: Analyzing a Prolific Info Stealer
Discover the latest insights on the Vidar network-based info stealer from our Darktrace experts and stay informed on cybersecurity threats.
Blog
Qakbot Resurgence in the Cyber Landscape
Stay informed on the evolving threat Qakbot. Protect yourself from the Qakbot resurgence! Learn more from our Darktrace AI Cybersecurity experts!
Blog
How Vidar Malware Spreads via Malvertising on Google
Discover how Vidar info stealer malware is distributed through malvertising on Google and the risks it poses to users and organizations.
Blog
BlackMatter's Smash-and-Grab Ransom Attack Incident Analysis
Stay informed on cybersecurity trends! Read about a BlackMatters ransom attack incident and Darktrace's analysis on how RESPOND could have stopped the attack.
Blog
How an Insider Exfiltrated Corporate Data to Google Cloud
Darktrace examines an insider exfiltrating corporate data from a Singaporean file server to Google Cloud. Explore Bytesize Security on Darktrace's blog.
Blog
How Raccoon Stealer v2 Infects Systems
Learn about Raccoon Stealer v2's infection process and its implications for cybersecurity. Discover effective strategies to protect your systems.
Blog
[Part 1] Analysis of a Raccoon Stealer v1 Infection
Darktrace’s SOC team observed a fast-paced compromise involving Raccoon Stealer v1. See which steps the Raccoon Stealer v1 took to extract company data!
Blog
Securing Patient Data at Cullman Regional Medical Center
Discover how Cullman Regional Medical Center safeguards patient data with Darktrace AI. Learn how to keep sensitive data protected with the Darktrace experts!
Blog
Strategies to Prolong Quantum Ransomware Attacks
Learn more about how Darktrace combats Quantum Ransomware changing strategy for cyberattacks. Explore the power of AI-driven network cyber security!
Blog
Kill Chain Insights: Detecting AutoIT Malware Compromise
Discover how AutoIt malware operates and learn strategies to combat this emerging threat in our latest blog post.
Blog
Steps of a BumbleBee Intrusion to a Cobalt Strike
Discover the steps of a Bumblebee intrusion, from initial detection to Cobalt Strike deployment. Learn how Darktrace defends against evolving threats with AI.
Previous
Next
Use cases
Blog
Customer stories
Integrations
Get a demo