Darktrace anuncia su intención de adquirir Cado Security.
Lea el comunicado de prensa
Plataforma
Productos
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Gestión integral de riesgos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Investiga cada alerta como un humano analista, a la velocidad y la escala de la IA
Servicios Darktrace
Maximice sus inversiones en seguridad con el soporte experto las 24 horas del día, los 7 días de la semana, y la gestión de incidentes de nuestro equipo global de SOC.
Centro de investigación de IA
Recursos
Clientes
Blog
Eventos
Dentro del SOC
La inferencia
Glosario
Todos los recursos
Libro blanco
Informe de amenazas semestral de 2024
Empresa
Carreras
Liderazgo
Noticias
Federal
Inversores
Academia
Jurídico
SDR Academy
Acerca de nosotros
Contactar
Socios
Visión general
Portal de socios
Socios tecnológicos
Integraciones
Socios destacados
Microsoft
AWS
McLaren
Productos
Visión general
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Defienda los sistemas críticos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Servicios
Centro de investigación de IA
Recursos
Todos los recursos
Clientes
Blog
Eventos
La inferencia
Dentro del SOC
Glosario
Empresa
Acerca de nosotros
Contactar
Carreras
Liderazgo
Noticias
Federal
Academia
SDR Academy
Jurídico
Socios
Visión general
Portal de socios
Socios tecnológicos
Conviértase en socio
Integraciones
Microsoft
AWS
McLaren
Obtenga una demostración
Obtenga una demo
Get a demo
Register now
Topic
Network
Explore real-world cyber-attacks and the latest trends impacting network security, from NDR to ZTNA and beyond.
View all
Category one
Category two
Category three
Category four
Network
RansomHub Ransomware: investigación de Darktrace sobre la herramienta más nueva en ShadowSyndicate's Arsenal
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Qing Hong Kwa
Senior Cyber Analyst and Deputy Analyst Team Lead, Singapore
Network
Cleo File Transfer Vulnerability: Patch Pitfalls and Darktrace’s Detection of Post-Exploitation Activities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Maria Geronikolou
Cyber Analyst
Network
Company Shuts Down Cyber-attacks with “Flawless” Detection and Response from Darktrace
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
The Darktrace Community
Network
Darktrace’s view on Operation Lunar Peek: Exploitation of Palo Alto firewall devices (CVE 2024-0012 and 2024-9474)
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Darktrace is Positioned as a Leader in the IDC MarketScape: Worldwide Network Detection and Response 2024 Vendor Assessment
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Darktrace Leading the Future of Network Detection and Response With Recognition from KuppingerCole
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Tactics Behind the Royal and Blacksuit Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Signe Zaharka
Senior Cyber Security Analyst
Network
Post-Exploitation Activities on Fortinet Devices: A Network-Based Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Triaging Triada: Understanding an Advanced Mobile Trojan and How it Targets Communication and Banking Applications
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
From Call to Compromise: Darktrace’s Response to a Vishing-Induced Network Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Rajendra Rushanth
Cyber Analyst
Network
FortiClient EMS Exploited: Attack Chain & Post Exploitation Tactics
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emily Megan Lim
Cyber Analyst
Network
Lifting the Fog: Darktrace’s Investigation into Fog Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Qing Hong Kwa
Senior Cyber Analyst and Deputy Analyst Team Lead, Singapore
Network
Decrypting the Matrix: How Darktrace Uncovered a KOK08 Ransomware Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Christina Kreza
Cyber Analyst
Network
How Darktrace Detects TeamCity Exploitation Activity
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Frank
Product Manager and Cyber Analyst
Network
Investigating the Adaptive Jupyter Information Stealer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst
Network
Qilin Ransomware: Detection and Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
Post-Exploitation Activities on PAN-OS Devices: A Network-Based Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Darktrace Investigation Into Medusa Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Maria Geronikolou
Cyber Analyst
Network
Uncovering the Sysrv-Hello Crypto-Jacking Bonet
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Shuh Chin Goh
Network
Strategies to Prolong Quantum Ransomware Attacks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nicole Wong
Cyber Security Analyst
Network
Revealing ViperSoftX Intrusion: Detecting Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
Information-Stealing Malware Malvertises on Google
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Roberto Martinez
Devalyst, Threat Researcher
Network
Darktrace’s Detection of a Hive Ransomware-as-Service
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emily Megan Lim
Cyber Analyst
Network
Post-Exploitation Activities of Ivanti CS/PS Appliances
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
The Rise of the Lumma Info-Stealer | Malware-as-a-Service
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emily Megan Lim
Cyber Analyst
Network
[Part 2] Typical Steps of a Raccoon Stealer v2 Infection
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
The Price of Admission: Countering Stolen Credentials with Darktrace
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Charlotte Thompson
Cyber Analyst
Network
[Part 1] Analysis of a Raccoon Stealer v1 Infection
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Mark Turner
SOC Shift Supervisor
Network
What Are the Early Signs of a Ransomware Attack?
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Darktrace's Investigation of Raspberry Robin Worm
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
What are Botnets and How Darktrace Uncovers Them
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Sliver C2: How Darktrace Provided a Sliver of Hope
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Natalia Sánchez Rocafort
Cyber Security Analyst
Network
Darktrace's Detection of Ransomware & Syssphinx
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Securing Patient Data at Cullman Regional Medical Center
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sean Simpson
Executive Director of IT, Cullman Regional Medical Center (Guest Contributor)
Network
How Darktrace Triumphed Over MyKings Botnet
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Oluwatosin Aturaka
Analyst Team Lead, Cambridge
Network
Prevent Cryptojacking Attacks with Darktrace AI Technology
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Victoria Baldie
Director of Analysis, ANZ
Network
Analyzing the Resurgence of Ryuk Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Quasar Remote Access Tool and Its Security Risks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nicole Wong
Cyber Security Analyst
Network
Understanding Qakbot Infections and Attack Paths
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Qakbot Resurgence in the Cyber Landscape
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst
Network
Detecting PurpleFox Rootkit with Darktrace AI
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Piramol Krishnan
Cyber Security Analyst
Network
Understanding Grief Ransomware Attacks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Oakley Cox
Director of Product
Network
Identifying PrivateLoader Network Threats
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
How PlugX Malware Has Evolved & Adapted
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst
Network
Pikabot Malware: Insights, Impact, & Attack Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Revealing Outlaw's Returning Features & New Tactics
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Understanding and Mitigating Sectop RAT
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
Protecting Against AlphV BlackCat Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Protecting Yourself from Laplas Clipper Crypto Theives
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Anna Gilbertson
Cyber Security Analyst
Network
Why Most Ransomware Attacks Occur "After Hours"
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Simulated vs. Real Malware: What You Need To Know
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Priya Thapa
Cyber Analyst
Network
How Darktrace Defeated SmokeLoader Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Patrick Anjos
Senior Cyber Analyst
Network
How Darktrace Antigena Thwarted Cobalt Strike Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Dylan Evans
Network
Gozi ISFB Malware Detection Insights and Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
Kill Chain Insights: Detecting AutoIT Malware Compromise
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Joel Davidson
Cyber Analyst
Network
Detecting & Containing Gootloader Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Ashiq Shafee
Cyber Security Analyst
Network
GitLab Vulnerability Exploit Detected
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Steps of a BumbleBee Intrusion to a Cobalt Strike
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Protecting Brazilian Organizations from Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Roberto Romeu
Senior SOC Analyst
Network
The Risks of Remote Access Tools
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Dylan Hinz
Cyber Analyst
Network
Analyzing Log4j Vulnerability in Crypto Mining Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Hanah Darley
Director of Threat Research
Network
Elevating Network Security: Confronting Trust, Ransomware, & Novel Attacks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Confluence CVE-2022-26134 Zero-Day: Detection & Guidance
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Detecting Unknown Ransomware: A Darktrace Case Study
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emma Foulger
Senior Cyber Analyst
Network
Log4Shell Vulnerability Detection & Response With Darktrace
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Detecting Trusted Network Relationship Abuse
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
How Darktrace AI Blocked Emotet Malspam
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
How Darktrace Quickly Foiled An Information Stealer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
Uncovering CyberCartel Threats in Latin America
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
Exploitation of ConnectWise ScreenConnect Vulnerabilities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
How CoinLoader Hijacks Networks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Signe Zaharka
Senior Cyber Security Analyst
Network
How an Insider Exfiltrated Corporate Data to Google Cloud
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Signe Zaharka
Senior Cyber Security Analyst
Network
BlackMatter's Smash-and-Grab Ransom Attack Incident Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
The Darktrace Analyst Team
Network
How Darktrace Detected Black Basta Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Matthew John
Director of Operations, SOC
Network
Darktrace’s Detection of Unattributed Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Natalia Sánchez Rocafort
Cyber Security Analyst
Network
Balada Injector: Darktrace’s Investigation into the Malware Exploiting WordPress Vulnerabilities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
Stopping Trickbot: Darktrace's Autonomous Response
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Amadey Info Stealer and N-Day Vulnerabilities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
How Darktrace Stopped Akira Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Manoel Kadja
Cyber Analyst
Network
Successfully Containing an Admin Credential Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
How Cactus Ransomware Was Detected and Stopped
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Tiana Kelly
Deputy Team Lead, London & Cyber Analyst
Network
Vidar Network: Analyzing a Prolific Info Stealer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Roberto Romeu
Senior SOC Analyst
Network
Why St. Catharines Chose Darktrace for Digital Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Wayne Racey
Manager of IT Operations, City of St Catharines (Guest Contributor)
Network
9 Stages of Ransomware & How AI Responds
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Dan Fein
VP, Product
Network
Darktrace Detection of 3CX Supply Chain Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst