Thoma Bravo Announces Offer to Acquire Darktrace plc
Learn more
Platform
Products
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Comprehensive risk management
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber AI Analyst
Investigates every alert like a human analyst, at the speed and scale of AI
Darktrace Services
Maximize your security investments with 24/7 expert support and incident management from our global SOC team.
AI Research Centre
Resources
Customers
Blog
Events
Inside the SOC
The Inference
Glossary
All resources
White paper
Half Year Threat Report 2024
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
About us
Contact
Partners
Overview
Partner Portal
Technology Partners
Integrations
Featured Partners
Microsoft
AWS
Mclaren
Products
Overview
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Defend critical systems
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/Proactive Exposure Management
/Attack Surface Management
/Incident Readiness & Recovery
Cyber AI Analyst
Services
AI Research Centre
Resources
All Resources
Customers
Blog
Events
The Inference
Inside the SOC
Glossary
Company
About us
Contact
Careers
Leadership
News
Federal
Academy
Legal
Partners
Overview
Partner Portal
Technology Partners
Become a Partner
Integrations
Microsoft
AWS
Mclaren
Get a demo
Get a demo
Darktrace Blog
Inside the SOC
A series exclusively authored by Darktrace's expert cyber analysts, containing technical deep dives of cyber incidents and the latest threat trends.
Latest Blog Posts
Darktrace’s Detection of Unattributed Ransomware
Leveraging anomaly-based detection, we successfully identified an ongoing ransomware attack on the network of a customer and the activity that preceded it.
Successfully Containing an Admin Credential Attack
Discover how Darktrace's anomaly-based threat detection thwarted a cyber attack on a customer's network, stopping a malicious actor in their tracks.
Detection of an Evasive Credential Harvester | IPFS Phishing
Discover the emerging trend of malicious actors abusing the Interplanetary File System (IPFS) file storage protocol in phishing campaigns. Learn more here!
Darktrace's Detection of Ransomware & Syssphinx
Read how Darktrace identified an attack technique by the threat group, Syssphinx. Learn how Darktrace's quick identification process can spot a threat.
Revealing Outlaw's Returning Features & New Tactics
Darktrace's investigation of the latest Outlaw crypto-mining operation, covering the resurgence of old tactics along with the emergence of new ones.
How Darktrace SOC Thwarted a BEC Attack
Discover how Darktrace's SOC detected and stopped a Business Email Compromise in a customer's SaaS environment.
Detecting and Responding to Vendor Email Compromises (VEC)
Learn how Darktrace detected and responded to a March 2023 Vendor Email Compromise (VEC) attacks on customer in the energy industry. Read more here!
How Darktrace Foiled QR Code Phishing
Explore Darktrace's successful detection of QR code phishing. Understand the methods used to thwart these sophisticated cyber threats.
How Darktrace Quickly Foiled An Information Stealer
Discover how Darktrace thwarted the CryptBot malware in just 2 seconds. Learn about this fast-moving threat and the defense strategies employed.
3CX Supply Chain Attack: Darktrace's Analysis
Explore Darktrace's detection of the 3CX supply chain attack. Understand the tactics used and gain insights to safeguard your network from similar threats.
Abuse of "PerfectData Software" May Create a Perfect Storm
Darktrace investigates several attacks through PerfectData Software on Microsoft 365 accounts and shows how we were able to prevent full account takeovers.
Darktrace’s Detection of a Hive Ransomware-as-Service
This blog investigates a new strain of ransomware, Hive, a ransomware-as-a-service. Darktrace was able to provide full visibility over the attacks.
Darktrace Stops Large-Scale Account Hijack
Learn how Darktrace detected and stopped a large-scale account hijack that led to a phishing attack. Protect your business with these insights.
Gozi ISFB Malware Detection Insights and Analysis
Learn how Darktrace detected the Gozi ISFB malware, a type of banking trojan, with Self-Learning AI. Stay informed about the latest cybersecurity threats.
Enhancing Darktrace with Microsoft Defender
Explore the integration of Microsoft Defender and Darktrace security solutions, and how they collaborate to enhance cybersecurity & support security teams.
Detecting Malicious Email Activity & AI Impersonating
Discover how two different phishing attempts from some known and unknown senders used a payroll diversion and credential sealing box link to harm users.
Understanding Qakbot Infections and Attack Paths
Explore the network-based analysis of Qakbot infections with Darktrace. Learn about the various attack paths used by cybercriminals and Darktrace's response.
Understanding Amadey Info Stealer & N-Day Vulnerabilities
Learn about the latest cybersecurity threat, Amadey info-stealer, exploiting N-day vulnerabilities. Stay informed with Darktrace's research and analysis.
Multi-Factor Authentication: Not the Silver Bullet
Multi-Factor Authentication (MFA) is a widely used security measure, but it's not bulletproof. See how threat actors can exploit MFA to access your information.
Defending Against Crypto Thieves with DETECT + RESPOND
Cyber criminals steal from crypto-currency platforms. Learn how Darktrace uncovered Lapalas Clipper activity & defended against cryptocurrency thieves.
Previous
Next