Thoma Bravo Announces Offer to Acquire Darktrace plc
Learn more
Platform
Products
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Comprehensive risk management
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber AI Analyst
Investigates every alert like a human analyst, at the speed and scale of AI
Darktrace Services
Maximize your security investments with 24/7 expert support and incident management from our global SOC team.
AI Research Centre
Resources
Customers
Blog
Events
Inside the SOC
The Inference
Glossary
All resources
White paper
Half Year Threat Report 2024
Company
Careers
Leadership
News
Federal
Investors
Legal
About us
Contact
Partners
Overview
Partner Portal
Technology Partners
Integrations
Featured Partners
Microsoft
AWS
Mclaren
Products
Overview
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Defend critical systems
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/Proactive Exposure Management
/Attack Surface Management
/Incident Readiness & Recovery
Cyber AI Analyst
Services
AI Research Centre
Resources
All Resources
Customers
Blog
Events
The Inference
Inside the SOC
Glossary
Company
About us
Contact
Careers
Leadership
News
Federal
Academy
Legal
Partners
Overview
Partner Portal
Technology Partners
Become a Partner
Integrations
Microsoft
AWS
Mclaren
Get a demo
Get a demo
Darktrace Blog
Inside the SOC
A series exclusively authored by Darktrace's expert cyber analysts, containing technical deep dives of cyber incidents and the latest threat trends.
Latest Blog Posts
Detecting Unknown Ransomware: A Darktrace Case Study
Learn how Darktrace uncovered uncategorized ransomware threats in the Summer of 2021 with Darktrace SOC. Stay ahead of cyber threats with Darktrace technology.
Emotet Resurgence: Cross-Industry Analysis
Technical insights on the Emotet resurgence in 2022 across various client environments, industries, and regions.
Bytesize Security: A Guide to HTML Phishing Attachments
Darktrace guides you through the common signs of HTML phishing attachments, including common phishing emails, clever impersonations, fake webpages, and more.
Cyber Tactics in the Russo-Ukrainian Conflict
The conflict between Russia and Ukraine has led to fears of a full-scale cyberwar. Learn the cyber attack tactics used, hacking groups involved, and more!
The Risks of Remote Access Tools
Discover how remote access tools in exploitations across OT/ICS and corporate environments benefit from Darktrace's product suite.
Self-Learning AI for Zero-Day and N-Day Attack Defense
Explore the differences between zero-day and n-day attacks on different customer servers to learn how Darktrace detects and prevents cyber threats effectively.
Identifying PrivateLoader Network Threats
Learn how Darktrace identifies network-based indicators of compromise for the PrivateLoader malware. Gain insights into advanced threat detection.
Confluence CVE-2022-26134 Zero-Day: Detection & Guidance
Stay informed with Darktrace's blog on detection and guidance for the Confluence CVE-2022-26134 zero-day vulnerability. Learn how to protect your systems.
Uncovering the Sysrv-Hello Crypto-Jacking Bonet
Discover the cyber kill chain of a Sysrv-hello botnet infection in France and gain insights into the latest TTPs of the botnet in March and April 2022.
Multi-Account Compromise in Office 365
Learn how internal phishing can compromise accounts swiftly & how Darktrace/Apps can prevent future attacks effectively.
How Darktrace AI Blocked Emotet Malspam
Explore Darktrace AI's success in combating Emotet malspam, enhancing security and minimizing risks with cutting-edge artificial intelligence.
Email Compromise To Mass Phishing Campaign
Read Darktrace's in-depth analysis on the shift from business email compromise to mass phishing campaigns. Gain the knowledge to safeguard your business.
How Darktrace Antigena Thwarted Cobalt Strike Attack
Learn how Darktrace's Antigena technology intercepted and delayed a Cobalt Strike intrusion. Discover more cybersecurity news and analyses on Darktrace's blog.
Explore Internet-Facing System Vulnerabilities
Read about 2021's top four incidents and how Darktrace's advanced threat detection technology identified and mitigated vulnerabilities. Learn more.
Analyzing Log4j Vulnerability in Crypto Mining Attack
Discover how Darktrace detected a campaign-like pattern that used the Log4j vulnerability for crypto-mining across multiple customers.
Stopping Trickbot: Darktrace's Autonomous Response
Darktrace's autonomous response successfully thwarted a Trickbot intrusion. See how AI played a crucial role in this defense.
The Impact of Conti Ransomware on OT Systems
Learn how ransomware can spread throughout converged IT/OT environments, and how Self-Learning AI empowers organizations to contain these threats.
Conti Ransomware Group Finds New Double Extortion Avenues
Discover how Darktrace was able to detect one of Conti Ransomware Groups crippling double extortion attacks at its earliest stages. Learn more now!
GitLab Vulnerability Exploit Detected
Stay updated on the latest cybersecurity threats and learn how AI detected a vulnerability exploit in GitLab.
How Ryuk Ransomware Has Made a Comeback
Discover how small-time criminals are getting ahold of Ryuk ransomware, and what organizations can do to protect themselves.
Previous
Next