Blog
/
/
April 9, 2024

Moving Beyond XDR to Achieve True Cyber Resilience with Darktrace ActiveAI Security Platform

Announcing the new Darktrace ActiveAI Security Platform designed to transform security operations. This approach gives security teams unprecedented visibility across any area where Darktrace is deployed, including cloud, email, network, endpoints, and operational technology (OT).
Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Mitchell Bezzina
VP, Product and Solutions Marketing
Default blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog image
09
Apr 2024

Evolving Threats Need Comprehensive Security

Attacker innovations have drastically increased the velocity, sophistication, and success of cyber security attacks, as seen with multi-domain and multi-stage attacks that are now widely used in adversary methodology.

When it comes to defense, traditional cyber security point solutions cannot keep up. They have a depth of intelligence in a specific domain but rely on existing attack data to detect threats. This allows the known to be stopped, but the uncertainty in identifying unknown threats creates an alert deluge. Security teams are then required to build processes to triage alerts, and manually combine data through APIs, integrations and rules – just to correlate incidents across multiple IT domains.

Traditional eXtended Detection and Response (XDR) rose to aid security teams, and while they are able to stitch together suspicious events from network, endpoint, and cloud, they still lack adequate domain coverage in areas such as email – where the majority of initial infection occurs – require human validation, prioritization, and triage, and ultimately remain reactive in nature.

Security teams are at a breaking point, with too many alerts, too little time, and fragmented support from a bloated vendor stack. Simply put, most organizations lack the human resources needed to maintain cyber resilience.

Introducing the Darktrace ActiveAI Security Platform

Darktrace ActiveAI Security was designed to transform security operations to a proactive state. Its AI trains on an organization’s specific business and IT information, learning the day-to-day normal operations, not yesterday's threat intelligence.

This approach gives security teams unprecedented visibility across any area where Darktrace is deployed, including cloud, email, network, endpoints, identities, and operational technology (OT). With this understanding of the business, the AI can detect and respond to known and unknown threats with precision, even those threats never seen before.

Darktrace’s proactive and incident response tools help your team get ahead of security gaps and potential process risk by understanding your internal and external threat surfaces and identifying where preparedness can be improved.

A unique and patented investigative AI, called Cyber AI Analyst, operates across the platform to augment human teams with automation and efficiency gains, performing continuous investigations of prevalent alerts to redefine the SecOps workflow and help security analysts arrive at decisions quickly.  An extensive range of services aid customer resources in getting the most out of the Darktrace ActiveAI Security Platform.

Figure 1: Powered by a self-learning AI that understands your unique business, the Darktrace ActiveAI Security Platform provides coverage across the entire enterprise. Cyber AI Analyst, our investigative AI, investigates relevant alerts helping human security teams triage and prioritize all relevant alerts, even those from 3rd party security tools, to transform security operations.

Security operations and the incident lifecycle

SOC teams have three general areas of focus, and each can be supported by Darktrace ActiveAI Security

1. The benefits of being proactive

Darktrace ActiveAI Security helps teams become proactive by identifying and closing gaps before they are exploited. This reduces the impact and cost of attacks.  

The platform achieves this by looking at each organization to understand potential human and machine entry points for an attacker. In an upcoming update, our technology will also include firewall rule analysis for more precise attack path modeling.

The AI considers its findings with local business and IT context to identify the most risky and impactful devices, identities, and vulnerabilities, so teams can prioritize what to patch first.

Additionally, Darktrace ActiveAI Security boosts proactivity with incident readiness, supporting each organization’s people, processes, and technology with training simulations, dynamic playbooks, and readiness reports.

2. Complete visibility of known and novel threats

Darktrace ActiveAI Security Platform drives efficiencies during the active incident phase, saving time and effort while providing comprehensive and tailored protection. It applies context from enterprise data, ingested from both native sources (email, cloud, operational technology, endpoints, identity, applications, and networks) and external sources (third-party security tools and intelligence) to detect known, novel, and unknown threats.

Other security vendors aggregate and generalize data across their customers, treating threat detection with a big data approach. They extract intelligence, write new rules and signatures, and train their supervised machine running in the cloud. Only after that do they distribute new detections based on the changes in the threat landscape. That leaves a window of opportunity for attackers. For example, when Log4J struck, most vendors needed precious time to catch up and defend against it

Contrast that to Darktrace’s approach to detection. Our AI continuously trains on each organization’s unique business data, allowing it to function beyond known attacks in the threat landscape. Therefore, our AI can defend organizations even against attacks that have never been seen before because it focuses on each customer’s data instead of trying to win this big data problem.

While our AI has always been able to surface threats without needing to decrypt traffic, because it can surface anomalies in the characteristics of the overall communication, an upcoming update will soon make decryption possible for deeper forensic analysis.

This also leads to massive efficiency wins. For example, self-regulation and detection accuracy. If our AI keeps seeing certain types of anomalies in an environment, and if those are part of a legitimate business process, the AI will autonomously start lowering the alert severity, therefore reducing the burden on security teams to fine-tune detection and alerting.

3. AI-led investigation and response

Darktrace ActiveAI Security Platform helps teams triage, investigate, and respond to accelerate response time and reduce disruption.

Traditional security stacks use a lot of raw data combined with threat intelligence, like rules and signatures and supervised detections. The results are then put together and presented to the human team, who still needs to triage, understand, and investigate the situation.

Darktrace customers natively ingest raw data, apply anomaly detection and business learning, then build chains of generic anomalies which could include threat intelligence of third-party alerts. Those are then continuously investigated by our Cyber AI Analyst and put forward for human verification and actioning of next steps if they are deemed critical. This simplifies the triage process to save investigation time.

An upcoming feature for the Cyber AI Analyst allows teams to customize how it investigates each threat type, such as configuring what type of hypotheses are being run – giving teams more control. The result is a complete transformation of the triage process, where every relevant alert is investigated for the security team, those critical are prioritized for action, others await secondary investigation, or allow analysts to proactively review security gaps to stop future attacks of the same attack paths.

Last but not least, we help drive efficiencies by automating threat response with behavioral containment. That means our AI can identify and stop unusual behavior that indicates a threat while still allowing normal benign business activity to continue, all without the security team’s having to predefine every conceivable reaction.

Conclusion

Darktrace ActiveAI Security is a native, holistic, AI-driven platform built on over ten years of AI research. It helps security teams shift to more a productive mode, finding known and unknown attacks and transforming the SOC to drive efficiency gains. It does this across the whole incident lifecycle to lower risk, reduce time spent on active incidents, and drive return on investment.

For more information on the Darktrace Platform, download the solution brief here.

Join over 9,000 customers who have started their journey to the Darktrace ActiveAI Security Platform by selecting one of our leading cybersecurity solutions in Email Security, Network Detection and Response, Cloud Native Application Protection, and OT Security.

Discover more about our ever-strengthening platform with the upcoming changes coming to Darktrace/Email and Darktrace/OT.

Learn about the intersection of cyber and AI by downloading the State of AI Cyber Security 2024 report to discover global findings that may surprise you, insights from security leaders, and recommendations for addressing today’s top challenges that you may face, too.

Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Mitchell Bezzina
VP, Product and Solutions Marketing

More in this series

No items found.

Blog

/

/

February 13, 2026

CVE-2026-1731: How Darktrace Sees the BeyondTrust Exploitation Wave Unfolding

Default blog imageDefault blog image

Note: Darktrace's Threat Research team is publishing now to help defenders. We will update continue updating this blog as our investigations unfold.

Background

On February 6, 2026, the Identity & Access Management solution BeyondTrust announced patches for a vulnerability, CVE-2026-1731, which enables unauthenticated remote code execution using specially crafted requests.  This vulnerability affects BeyondTrust Remote Support (RS) and particular older versions of Privileged Remote Access (PRA) [1].

A Proof of Concept (PoC) exploit for this vulnerability was released publicly on February 10, and open-source intelligence (OSINT) reported exploitation attempts within 24 hours [2].

Previous intrusions against Beyond Trust technology have been cited as being affiliated with nation-state attacks, including a 2024 breach targeting the U.S. Treasury Department. This incident led to subsequent emergency directives from  the Cybersecurity and Infrastructure Security Agency (CISA) and later showed attackers had chained previously unknown vulnerabilities to achieve their goals [3].

Additionally, there appears to be infrastructure overlap with React2Shell mass exploitation previously observed by Darktrace, with command-and-control (C2) domain  avg.domaininfo[.]top seen in potential post-exploitation activity for BeyondTrust, as well as in a React2Shell exploitation case involving possible EtherRAT deployment.

Darktrace Detections

Darktrace’s Threat Research team has identified highly anomalous activity across several customers that may relate to exploitation of BeyondTrust since February 10, 2026. Observed activities include:

-              Outbound connections and DNS requests for endpoints associated with Out-of-Band Application Security Testing; these services are commonly abused by threat actors for exploit validation.  Associated Darktrace models include:

o    Compromise / Possible Tunnelling to Bin Services

-              Suspicious executable file downloads. Associated Darktrace models include:

o    Anomalous File / EXE from Rare External Location

-              Outbound beaconing to rare domains. Associated Darktrace models include:

o   Compromise / Agent Beacon (Medium Period)

o   Compromise / Agent Beacon (Long Period)

o   Compromise / Sustained TCP Beaconing Activity To Rare Endpoint

o   Compromise / Beacon to Young Endpoint

o   Anomalous Server Activity / Rare External from Server

o   Compromise / SSL Beaconing to Rare Destination

-              Unusual cryptocurrency mining activity. Associated Darktrace models include:

o   Compromise / Monero Mining

o   Compromise / High Priority Crypto Currency Mining

And model alerts for:

o    Compromise / Rare Domain Pointing to Internal IP

IT Defenders: As part of best practices, we highly recommend employing an automated containment solution in your environment. For Darktrace customers, please ensure that Autonomous Response is configured correctly. More guidance regarding this activity and suggested actions can be found in the Darktrace Customer Portal.  

Appendices

Potential indicators of post-exploitation behavior:

·      217.76.57[.]78 – IP address - Likely C2 server

·      hXXp://217.76.57[.]78:8009/index.js - URL -  Likely payload

·      b6a15e1f2f3e1f651a5ad4a18ce39d411d385ac7  - SHA1 - Likely payload

·      195.154.119[.]194 – IP address – Likely C2 server

·      hXXp://195.154.119[.]194/index.js - URL – Likely payload

·      avg.domaininfo[.]top – Hostname – Likely C2 server

·      104.234.174[.]5 – IP address - Possible C2 server

·      35da45aeca4701764eb49185b11ef23432f7162a – SHA1 – Possible payload

·      hXXp://134.122.13[.]34:8979/c - URL – Possible payload

·      134.122.13[.]34 – IP address – Possible C2 server

·      28df16894a6732919c650cc5a3de94e434a81d80 - SHA1 - Possible payload

References:

1.        https://nvd.nist.gov/vuln/detail/CVE-2026-1731

2.        https://www.securityweek.com/beyondtrust-vulnerability-targeted-by-hackers-within-24-hours-of-poc-release/

3.        https://www.rapid7.com/blog/post/etr-cve-2026-1731-critical-unauthenticated-remote-code-execution-rce-beyondtrust-remote-support-rs-privileged-remote-access-pra/

Continue reading
About the author
Emma Foulger
Global Threat Research Operations Lead

Blog

/

/

February 13, 2026

How AI is redefining cybersecurity and the role of today’s CIO

Default blog imageDefault blog image

Why AI is essential to modern security

As attackers use automation and AI to outpace traditional tools and people, our approach to cybersecurity must fundamentally change. That’s why one of my first priorities as Withum's CIO was to elevate cybersecurity from a technical function to a business enabler.

What used to be “IT’s problem” is now a boardroom conversation – and for good reason. Protecting our data, our people, and our clients directly impacts revenue, reputation and competitive positioning.  

As CIOs / CISOs, our responsibilities aren’t just keeping systems running, but enabling trust, protecting our organization's reputation, and giving the business confidence to move forward even as the digital world becomes less predictable. To pull that off, we need to know the business inside-out, understand risk, and anticipate what's coming next. That's where AI becomes essential.

Staying ahead when you’re a natural target

With more than 3,100 team members and over 1,000 CPAs (Certified Public Accountant), Withum’s operates in an industry that naturally attracts attention from attackers. Firms like ours handle highly sensitive financial and personal information, which puts us squarely in the crosshairs for sophisticated phishing, ransomware, and cloud-based attacks.

We’ve built our security program around resilience, visibility, and scale. By using Darktrace’s AI-powered platform, we can defend against both known and unknown threats, across email and network, without slowing our teams down.

Our focus is always on what we’re protecting: our clients’ information, our intellectual property, and the reputation of the firm. With Darktrace, we’re not just keeping up with the massive volume of AI-powered attacks coming our way, we’re staying ahead. The platform defends our digital ecosystem around the clock, detecting potential threats across petabytes of data and autonomously investigating and responding to tens of thousands of incidents every year.

Catching what traditional tools miss

Beyond the sheer scale of attacks, Darktrace ActiveAI Security PlatformTM is critical for identifying threats that matter to our business. Today’s attackers don’t use generic techniques. They leverage automation and AI to craft highly targeted attacks – impersonating trusted colleagues, mimicking legitimate websites, and weaving in real-world details that make their messages look completely authentic.

The platform, covering our network, endpoints, inboxes, cloud and more is so effective because it continuously learns what’s normal for our business: how our users typically behave, the business- and industry-specific language we use, how systems communicate, and how cloud resources are accessed. It picks up on minute details that would sail right past traditional tools and even highly trained security professionals.

Freeing up our team to do what matters

On average, Darktrace autonomously investigates 88% of all our security events, using AI to connect the dots across email, network, and cloud activity to figure out what matters. That shift has changed how our team works. Instead of spending hours sorting through alerts, we can focus on proactive efforts that actually strengthen our security posture.

For example, we saved 1,850 hours on investigating security issues over a ten-day period. We’ve reinvested the time saved into strengthening policies, refining controls, and supporting broader business initiatives, rather than spending endless hours manually piecing together alerts.

Real confidence, real results

The impact of our AI-driven approach goes well beyond threat detection. Today, we operate from a position of confidence, knowing that threats are identified early, investigated automatically, and communicated clearly across our organization.

That confidence was tested when we withstood a major ransomware attack by a well-known threat group. Not only were we able to contain the incident, but we were able to trace attacker activity and provided evidence to law enforcement. That was an exhilarating experience! My team did an outstanding job, and moments like that reinforce exactly why we invest in the right technology and the right people.

Internally, this capability has strengthened trust at the executive level. We share security reporting regularly with leadership, translating technical activity into business-relevant insights. That transparency reinforces cybersecurity as a shared responsibility, one that directly supports growth, continuity, and reputation.

Culturally, we’ve embedded security awareness into daily operations through mandatory monthly training, executive communication, and real-world industry examples that keep cybersecurity top of mind for every employee.

The only headlines we want are positive ones: Withum expanding services, Withum growing year over year. Security plays a huge role in making sure that’s the story we get to tell.

What’s next

Looking ahead, we’re expanding our use of Darktrace, including new cloud capabilities that extend AI-driven visibility and investigation into our AWS and Azure environments.

As I continue shaping our security team, I look for people with passion, curiosity, and a genuine drive to solve problems. Those qualities matter just as much as formal credentials in my view. Combined with AI, these attributes help us build a resilient, engaged security function with low turnover and high impact.

For fellow technology leaders, my advice is simple: be forward-thinking and embrace change. We must understand the business, the threat landscape, and how technology enables both. By augmenting human expertise rather than replacing it, AI allows us to move upstream by anticipating risk, advising the business, and fostering stronger collaboration across teams.

Continue reading
About the author
Your data. Our AI.
Elevate your network security with Darktrace AI