Darktrace hat die Übernahme von Cado Security abgeschlossen.
Lesen Sie die Pressemitteilung zur Ankündigung hier
Plattform
Produkte
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Umfassendes Risikomanagement
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber-KI Analyst
Untersucht jeden Alarm wie ein Mensch Analyst, mit der Geschwindigkeit und dem Umfang von KI
Darktrace-Dienste
Maximieren Sie Ihre Sicherheitsinvestitionen mit rund um die Uhr verfügbarem Expertensupport und Störfallmanagement durch unser globales SOC-Team.
KI-Forschungszentrum
Ressourcen
Kunden
Blog
Ereignisse
Im SOC
Die Inferenz
Glossar
Alle Ressourcen
Weißbuch
Das KI-Arsenal: Die Tools verstehen, die die Cybersicherheit prägen
Firma
Karriere
Führung
Neuigkeiten
föderal
Investoren
Akademie
Rechtliches
SDR Academy
Über uns
Kontakt
Partner
Überblick
Partnerportal
Technologiepartner
Integrationen
Ausgewählte Partner
Microsoft
AWS
McLaren
Produkte
Überblick
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Schützen Sie kritische Systeme
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/Proaktives Expositionsmanagement
/Verwaltung der Angriffsfläche
/Vorfallbereitschaft und Wiederherstellung
Cyber-KI Analyst
Dienstleistungen
KI-Forschungszentrum
Ressourcen
Alle Ressourcen
Kunden
Blog
Ereignisse
Die Inferenz
Im SOC
Glossar
Firma
Über uns
Kontakt
Karriere
Führung
Neuigkeiten
föderal
Akademie
SDR Academy
Rechtliches
Partner
Überblick
Partnerportal
Technologiepartner
Werden Sie ein Partner
Integrationen
Microsoft
AWS
McLaren
Holen Sie sich eine Demo
Demo anfordern
Get a demo
Registriere dich jetzt
Topic
Network
Explore real-world cyber-attacks and the latest trends impacting network security, from NDR to ZTNA and beyond.
View all
Category one
Category two
Category three
Category four
Network
RansomHub Ransomware: Darktrace’s Investigation of the Newest Tool in ShadowSyndicate's Arsenal
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Qing Hong Kwa
Senior Cyber Analyst and Deputy Analyst Team Lead, Singapore
Network
Cleo File Transfer Vulnerability: Patch Pitfalls and Darktrace’s Detection of Post-Exploitation Activities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Maria Geronikolou
Cyber Analyst
Network
Company Shuts Down Cyber-attacks with “Flawless” Detection and Response from Darktrace
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
The Darktrace Community
Network
Darktrace’s view on Operation Lunar Peek: Exploitation of Palo Alto firewall devices (CVE 2024-0012 and 2024-9474)
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Darktrace is Positioned as a Leader in the IDC MarketScape: Worldwide Network Detection and Response 2024 Vendor Assessment
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Darktrace Leading the Future of Network Detection and Response With Recognition from KuppingerCole
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Tactics Behind the Royal and Blacksuit Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Signe Zaharka
Senior Cyber Security Analyst
Network
Post-Exploitation Activities on Fortinet Devices: A Network-Based Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Triaging Triada: Understanding an Advanced Mobile Trojan and How it Targets Communication and Banking Applications
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
From Call to Compromise: Darktrace’s Response to a Vishing-Induced Network Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Rajendra Rushanth
Cyber Analyst
Network
FortiClient EMS Exploited: Attack Chain & Post Exploitation Tactics
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emily Megan Lim
Cyber Analyst
Network
Lifting the Fog: Darktrace’s Investigation into Fog Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Qing Hong Kwa
Senior Cyber Analyst and Deputy Analyst Team Lead, Singapore
Network
Decrypting the Matrix: How Darktrace Uncovered a KOK08 Ransomware Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Christina Kreza
Cyber Analyst
Network
How Darktrace Detects TeamCity Exploitation Activity
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Frank
Product Manager and Cyber Analyst
Network
Investigating the Adaptive Jupyter Information Stealer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst
Network
Qilin Ransomware: Detection and Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
Post-Exploitation Activities on PAN-OS Devices: A Network-Based Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Darktrace Investigation Into Medusa Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Maria Geronikolou
Cyber Analyst
Network
Uncovering the Sysrv-Hello Crypto-Jacking Bonet
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Shuh Chin Goh
Network
Strategies to Prolong Quantum Ransomware Attacks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nicole Wong
Cyber Security Analyst
Network
Revealing ViperSoftX Intrusion: Detecting Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
Information-Stealing Malware Malvertises on Google
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Roberto Martinez
Devalyst, Threat Researcher
Network
Darktrace’s Detection of a Hive Ransomware-as-Service
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emily Megan Lim
Cyber Analyst
Network
Post-Exploitation Activities of Ivanti CS/PS Appliances
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
The Rise of the Lumma Info-Stealer | Malware-as-a-Service
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emily Megan Lim
Cyber Analyst
Network
[Part 2] Typical Steps of a Raccoon Stealer v2 Infection
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
The Price of Admission: Countering Stolen Credentials with Darktrace
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Charlotte Thompson
Cyber Analyst
Network
[Part 1] Analysis of a Raccoon Stealer v1 Infection
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Mark Turner
SOC Shift Supervisor
Network
What Are the Early Signs of a Ransomware Attack?
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Darktrace's Investigation of Raspberry Robin Worm
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
What are Botnets and How Darktrace Uncovers Them
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Sliver C2: How Darktrace Provided a Sliver of Hope
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Natalia Sánchez Rocafort
Cyber Security Analyst
Network
Darktrace's Detection of Ransomware & Syssphinx
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Securing Patient Data at Cullman Regional Medical Center
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sean Simpson
Executive Director of IT, Cullman Regional Medical Center (Guest Contributor)
Network
How Darktrace Triumphed Over MyKings Botnet
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Oluwatosin Aturaka
Analyst Team Lead, Cambridge
Network
Prevent Cryptojacking Attacks with Darktrace AI Technology
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Victoria Baldie
Director of Analysis, ANZ
Network
Analyzing the Resurgence of Ryuk Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Quasar Remote Access Tool and Its Security Risks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nicole Wong
Cyber Security Analyst
Network
Understanding Qakbot Infections and Attack Paths
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Qakbot Resurgence in the Cyber Landscape
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst
Network
Detecting PurpleFox Rootkit with Darktrace AI
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Piramol Krishnan
Cyber Security Analyst
Network
Understanding Grief Ransomware Attacks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Oakley Cox
Director of Product
Network
Identifying PrivateLoader Network Threats
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
How PlugX Malware Has Evolved & Adapted
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst
Network
Pikabot Malware: Insights, Impact, & Attack Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Revealing Outlaw's Returning Features & New Tactics
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Understanding and Mitigating Sectop RAT
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
Protecting Against AlphV BlackCat Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Protecting Yourself from Laplas Clipper Crypto Theives
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Anna Gilbertson
Cyber Security Analyst
Network
Why Most Ransomware Attacks Occur "After Hours"
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Simulated vs. Real Malware: What You Need To Know
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Priya Thapa
Cyber Analyst
Network
How Darktrace Defeated SmokeLoader Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Patrick Anjos
Senior Cyber Analyst
Network
How Darktrace Antigena Thwarted Cobalt Strike Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Dylan Evans
Network
Gozi ISFB Malware Detection Insights and Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
Kill Chain Insights: Detecting AutoIT Malware Compromise
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Joel Davidson
Cyber Analyst
Network
Detecting & Containing Gootloader Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Ashiq Shafee
Cyber Security Analyst
Network
GitLab Vulnerability Exploit Detected
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Steps of a BumbleBee Intrusion to a Cobalt Strike
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Protecting Brazilian Organizations from Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Roberto Romeu
Senior SOC Analyst
Network
The Risks of Remote Access Tools
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Dylan Hinz
Cyber Analyst
Network
Analyzing Log4j Vulnerability in Crypto Mining Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Hanah Darley
Director of Threat Research
Network
Elevating Network Security: Confronting Trust, Ransomware, & Novel Attacks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Confluence CVE-2022-26134 Zero-Day: Detection & Guidance
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Detecting Unknown Ransomware: A Darktrace Case Study
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emma Foulger
Senior Cyber Analyst
Network
Log4Shell Vulnerability Detection & Response With Darktrace
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Detecting Trusted Network Relationship Abuse
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
How Darktrace AI Blocked Emotet Malspam
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
Analyzing Post-Exploitation on Papercut Servers
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
How Darktrace Quickly Foiled An Information Stealer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
Uncovering CyberCartel Threats in Latin America
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
Exploitation of ConnectWise ScreenConnect Vulnerabilities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
How CoinLoader Hijacks Networks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Signe Zaharka
Senior Cyber Security Analyst
Network
How an Insider Exfiltrated Corporate Data to Google Cloud
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Signe Zaharka
Senior Cyber Security Analyst
Network
BlackMatter's Smash-and-Grab Ransom Attack Incident Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
The Darktrace Analyst Team
Network
How Darktrace Detected Black Basta Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Matthew John
Director of Operations, SOC
Network
Darktrace’s Detection of Unattributed Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Natalia Sánchez Rocafort
Cyber Security Analyst
Network
Balada Injector: Darktrace’s Investigation into the Malware Exploiting WordPress Vulnerabilities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
Stopping Trickbot: Darktrace's Autonomous Response
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Amadey Info Stealer and N-Day Vulnerabilities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
How Darktrace Stopped Akira Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Manoel Kadja
Cyber Analyst
Network
Successfully Containing an Admin Credential Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
How Cactus Ransomware Was Detected and Stopped
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Tiana Kelly
Deputy Team Lead, London & Cyber Analyst
Network
Vidar Network: Analyzing a Prolific Info Stealer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Roberto Romeu
Senior SOC Analyst
Network
Why St. Catharines Chose Darktrace for Digital Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Wayne Racey
Manager of IT Operations, City of St Catharines (Guest Contributor)
Network
9 Stages of Ransomware & How AI Responds
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Dan Fein
VP, Product
Network
Darktrace Detection of 3CX Supply Chain Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst