Thoma Bravo Announces Offer to Acquire Darktrace plc
Learn more
Platform
Products
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Comprehensive risk management
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber AI Analyst
Investigates every alert like a human analyst, at the speed and scale of AI
Darktrace Services
Maximize your security investments with 24/7 expert support and incident management from our global SOC team.
AI Research Centre
Resources
Customers
Blog
Events
Inside the SOC
The Inference
Glossary
All resources
White paper
Half Year Threat Report 2024
Company
Careers
Leadership
News
Federal
Investors
Legal
About us
Contact
Partners
Overview
Partner Portal
Technology Partners
Integrations
Featured Partners
Microsoft
AWS
Mclaren
Products
Overview
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Defend critical systems
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/Proactive Exposure Management
/Attack Surface Management
/Incident Readiness & Recovery
Cyber AI Analyst
Services
AI Research Centre
Resources
All Resources
Customers
Blog
Events
The Inference
Inside the SOC
Glossary
Company
About us
Contact
Careers
Leadership
News
Federal
Academy
Legal
Partners
Overview
Partner Portal
Technology Partners
Become a Partner
Integrations
Microsoft
AWS
Mclaren
Get a demo
Get a demo
Darktrace/Network Blog
Across the network
Darktrace/Network is in action all over the globe. Learn more about what’s behind it from Darktrace experts.
Latest Blog Posts
Blog
How Darktrace Could Have Stopped a Surprise DDoS Incident
Learn how Darktrace could revolutionize DDoS defense, enabling companies to stop threats without 24/7 monitoring. Read more about how we thwart attacks!
Blog
[Part 2] Typical Steps of a Raccoon Stealer v2 Infection
Since the release of version 2 of Raccoon Stealer, Darktrace’s SOC has observed a surge in activity. See the typical steps used by this new threat!
Blog
[Part 1] Analysis of a Raccoon Stealer v1 Infection
Darktrace’s SOC team observed a fast-paced compromise involving Raccoon Stealer v1. See which steps the Raccoon Stealer v1 took to extract company data!
Blog
Strategies to Prolong Quantum Ransomware Attacks
Learn more about how Darktrace combats Quantum Ransomware changing strategy for cyberattacks. Explore the power of AI-driven network cyber security!
Blog
Compliance Threat: RedLine Information Stealer
Darktrace reveals the compliance risks posed by the RedLine information stealer. Read about their analysis and how to defend against this cyber threat.
Blog
Steps of a BumbleBee Intrusion to a Cobalt Strike
Discover the steps of a Bumblebee intrusion, from initial detection to Cobalt Strike deployment. Learn how Darktrace defends against evolving threats with AI.
Blog
Why St. Catharines Chose Darktrace for Digital Security
Discover why St. Catharines partnered with Darktrace to secure their digital assets and protect against cyber threats.
Blog
How Cyber Criminals Are Profiting from Crypto
Cyber criminals are exploiting organizations with botnets to mine cryptocurrency. Learn how Darktrace Prevent can strengthen defenses against these threats.
Blog
NJ State Bar Moves Towards Business-Wide Autonomous Security
See how the New Jersey State Bar Association adopted Darktrace’s Autonomous Response technology across and stopped a sophisticated SaaS attack. Read more.
Blog
Stopping Trickbot: Darktrace's Autonomous Response
Darktrace's autonomous response successfully thwarted a Trickbot intrusion. See how AI played a crucial role in this defense.
Blog
The Future of Cyber Security: 2022 Predictions by Darktrace
Discover cyber security predictions for 2022 by Darktrace's experts. Learn how to navigate future cyber threats and enhance your security strategy!
Blog
Log4Shell Vulnerability Detection & Response With Darktrace
Learn how Darktrace's AI detects and responds to Log4Shell attacks. Explore real-world examples and see how Darktrace identified and mitigated cyber threats.
Blog
Darktrace Defends McLaren Racing From Supply Chain Attacks
McLaren Racing chose Darktrace's self-learning AI to fight off supply chain attacks. Learn how Darktrace safeguards their organization with elite cybersecurity.
Blog
How Hackers Blend Into Environments by Living Off the Land
Discover how cyber-criminals blend in using Living off the Land techniques. Learn how Self-Learning AI can detect attacks leveraging this strategy in real time.
Blog
How Ryuk Ransomware Has Made a Comeback
Discover how small-time criminals are getting ahold of Ryuk ransomware, and what organizations can do to protect themselves.
Blog
AI Uncovered Outlaw's Crypto Mining Operation
Discover how Darktrace AI technology exposed a hidden cryptocurrency mining scheme. Learn about the power of Darktrace AI in cybersecurity.
Blog
Defending Tokyo Olympics: AI Neutralizes IoT Attack
Learn how Darktrace autonomously thwarted a cyber-attack on a national sporting body before the Tokyo Olympics in this detailed breakdown.
Blog
What Are the Early Signs of a Ransomware Attack?
Discover the early signs of ransomware and how to defend against it. Often attack is the best form of defense with cybersecurity. Learn more here!
Blog
Minimizing the REvil Impact Delivered via Kaseya Servers
Ransomware group REvil recently infiltrated Managed Service Providers for 1,500+ companies. See how Darktrace's autonomous response protected customer data.
Blog
Post-Mortem Analysis of a SQL Server Exploit
Learn about the post-mortem analysis of a SQL Server exploit. Discover key insights and strategies to enhance your cybersecurity defenses.
Next
Use Cases
Blog
Customer Stories
Integrations
Get a demo