Darktrace has completed the acquisition of Cado Security.
Read the announcement press release here
Platform
Products
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Comprehensive risk management
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber AI Analyst
Investigates every alert like a human analyst, at the speed and scale of AI
Darktrace Services
Maximize your security investments with 24/7 expert support and incident management from our global SOC team.
Our AI
Resources
Customers
Blog
Events
Inside the SOC
The Inference
Glossary
All resources
White paper
The AI Arsenal: Understanding the Tools Shaping Cybersecurity
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partners
Overview
Partner Portal
Technology Partners
Integrations
Featured Partners
Microsoft
AWS
Mclaren
Products
Overview
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Defend critical systems
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/Proactive Exposure Management
/Attack Surface Management
/Incident Readiness & Recovery
Cyber AI Analyst
Services
Our AI
Resources
All Resources
Customers
Blog
Events
The Inference
Inside the SOC
Glossary
Company
About us
Contact
Careers
Leadership
News
Federal
Academy
SDR Academy
Legal
Partners
Overview
Partner Portal
Technology Partners
Become a Partner
Integrations
Microsoft
AWS
Mclaren
Get a demo
Get a demo
Get a demo
Register now
Topic
Network
Explore real-world cyber-attacks and the latest trends impacting network security, from NDR to ZTNA and beyond.
View all
Category one
Category two
Category three
Category four
Network
Cyberhaven Supply Chain Attack: Exploiting Browser Extensions
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Rajendra Rushanth
Cyber Analyst
Network
Darktrace's Detection of State-Linked ShadowPad Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Darktrace Releases Annual 2024 Threat Insights
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
The Darktrace Threat Research Team
Network
Defending Against Living-off-the-Land Attacks: Anomaly Detection in Action
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
RansomHub Revisited: New Front-Runner in the Ransomware-as-a-Service Marketplace
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Maria Geronikolou
Cyber Analyst
Network
Reimagining Your SOC: Unlocking a Proactive State of Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Gabriel Few-Wiegratz
Product Marketing Manager, Exposure Management and Incident Readiness
Network
RansomHub Ransomware: Darktrace’s Investigation of the Newest Tool in ShadowSyndicate's Arsenal
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Qing Hong Kwa
Senior Cyber Analyst and Deputy Analyst Team Lead, Singapore
Network
Reimagining Your SOC: How to Shift Away From Reactive Network Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Mikey Anderson
Product Marketing Manager, Network Detection & Response
Network
Cleo File Transfer Vulnerability: Patch Pitfalls and Darktrace’s Detection of Post-Exploitation Activities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Maria Geronikolou
Cyber Analyst
Network
Company Shuts Down Cyber-attacks with “Flawless” Detection and Response from Darktrace
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
The Darktrace Community
Network
Darktrace’s view on Operation Lunar Peek: Exploitation of Palo Alto firewall devices (CVE 2024-0012 and 2024-9474)
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Darktrace is Positioned as a Leader in the IDC MarketScape: Worldwide Network Detection and Response 2024 Vendor Assessment
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Mikey Anderson
Product Marketing Manager, Network Detection & Response
Network
Darktrace Leading the Future of Network Detection and Response With Recognition from KuppingerCole
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Gabriel Few-Wiegratz
Product Marketing Manager, Exposure Management and Incident Readiness
Network
Tactics Behind the Royal and Blacksuit Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Signe Zaharka
Senior Cyber Security Analyst
Network
Post-Exploitation Activities on Fortinet Devices: A Network-Based Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Triaging Triada: Understanding an Advanced Mobile Trojan and How it Targets Communication and Banking Applications
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
From Call to Compromise: Darktrace’s Response to a Vishing-Induced Network Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Rajendra Rushanth
Cyber Analyst
Network
FortiClient EMS Exploited: Attack Chain & Post Exploitation Tactics
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emily Megan Lim
Cyber Analyst
Network
Lifting the Fog: Darktrace’s Investigation into Fog Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Qing Hong Kwa
Senior Cyber Analyst and Deputy Analyst Team Lead, Singapore
Network
Decrypting the Matrix: How Darktrace Uncovered a KOK08 Ransomware Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Christina Kreza
Cyber Analyst
Network
How Darktrace Detects TeamCity Exploitation Activity
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Frank
Product Manager and Cyber Analyst
Network
Investigating the Adaptive Jupyter Information Stealer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst
Network
Qilin Ransomware: Detection and Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
Post-Exploitation Activities on PAN-OS Devices: A Network-Based Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Darktrace Investigation Into Medusa Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Maria Geronikolou
Cyber Analyst
Network
The Price of Admission: Countering Stolen Credentials with Darktrace
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Charlotte Thompson
Cyber Analyst
Network
Elevating Network Security: Confronting Trust, Ransomware, & Novel Attacks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Mikey Anderson
Product Marketing Manager, Network Detection & Response
Network
Exploitation of ConnectWise ScreenConnect Vulnerabilities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
How Cactus Ransomware Was Detected and Stopped
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Tiana Kelly
Deputy Team Lead, London & Cyber Analyst
Network
Sliver C2: How Darktrace Provided a Sliver of Hope
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Natalia Sánchez Rocafort
Cyber Security Analyst
Network
Balada Injector: Darktrace’s Investigation into the Malware Exploiting WordPress Vulnerabilities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
Darktrace's Investigation of Raspberry Robin Worm
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
What are Botnets and How Darktrace Uncovers Them
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Pikabot Malware: Insights, Impact, & Attack Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Brianna Leddy
Director of Analyst Operations
Network
Simulated vs. Real Malware: What You Need To Know
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Priya Thapa
Cyber Analyst
Network
Protecting Against AlphV BlackCat Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Quasar Remote Access Tool and Its Security Risks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nicole Wong
Cyber Security Analyst
Network
Detecting & Containing Gootloader Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Ashiq Shafee
Cyber Security Analyst
Network
How CoinLoader Hijacks Networks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Signe Zaharka
Senior Cyber Security Analyst
Network
How Darktrace Defeated SmokeLoader Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Patrick Anjos
Senior Cyber Analyst
Network
Post-Exploitation Activities of Ivanti CS/PS Appliances
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Detecting Trusted Network Relationship Abuse
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Uncovering CyberCartel Threats in Latin America
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
Ivanti Sentry Vulnerability | Analysis & Insights
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
How Darktrace Triumphed Over MyKings Botnet
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Oluwatosin Aturaka
Analyst Team Lead, Cambridge
Network
Detecting PurpleFox Rootkit with Darktrace AI
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Piramol Krishnan
Cyber Security Analyst
Network
Understanding and Mitigating Sectop RAT
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
How PlugX Malware Has Evolved & Adapted
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst
Network
Protecting Brazilian Organizations from Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Roberto Romeu
Senior SOC Analyst
Network
Revealing ViperSoftX Intrusion: Detecting Malware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
How Darktrace Detected Black Basta Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Matthew John
Director of Operations, SOC
Network
How Darktrace Stopped Akira Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Manoel Kadja
Cyber Analyst
Network
The Rise of the Lumma Info-Stealer | Malware-as-a-Service
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emily Megan Lim
Cyber Analyst
Network
Analyzing Post-Exploitation on Papercut Servers
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Darktrace’s Detection of Unattributed Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Natalia Sánchez Rocafort
Cyber Security Analyst
Network
Successfully Containing an Admin Credential Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
Darktrace's Detection of Ransomware & Syssphinx
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
Revealing Outlaw's Returning Features & New Tactics
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Adam Potter
Senior Cyber Analyst
Network
How Darktrace Quickly Foiled An Information Stealer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Alexandra Sentenac
Cyber Analyst
Network
Darktrace Detection of 3CX Supply Chain Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst
Network
Darktrace’s Detection of a Hive Ransomware-as-Service
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emily Megan Lim
Cyber Analyst
Network
Gozi ISFB Malware Detection Insights and Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Justin Torres
Cyber Analyst
Network
Understanding Qakbot Infections and Attack Paths
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Amadey Info Stealer and N-Day Vulnerabilities
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
Protecting Yourself from Laplas Clipper Crypto Theives
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Anna Gilbertson
Cyber Security Analyst
Network
Vidar Network: Analyzing a Prolific Info Stealer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Roberto Romeu
Senior SOC Analyst
Network
Prevent Cryptojacking Attacks with Darktrace AI Technology
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Victoria Baldie
Director of Analysis, ANZ
Network
Information-Stealing Malware Malvertises on Google
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Roberto Martinez
Devalyst, Threat Researcher
Network
Qakbot Resurgence in the Cyber Landscape
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nahisha Nobregas
SOC Analyst
Network
BlackMatter's Smash-and-Grab Ransom Attack Incident Analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
The Darktrace Analyst Team
Network
How an Insider Exfiltrated Corporate Data to Google Cloud
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Signe Zaharka
Senior Cyber Security Analyst
Network
[Part 2] Typical Steps of a Raccoon Stealer v2 Infection
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
[Part 1] Analysis of a Raccoon Stealer v1 Infection
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Mark Turner
SOC Shift Supervisor
Network
Strategies to Prolong Quantum Ransomware Attacks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Nicole Wong
Cyber Security Analyst
Network
Kill Chain Insights: Detecting AutoIT Malware Compromise
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Joel Davidson
Cyber Analyst
Network
Securing Patient Data at Cullman Regional Medical Center
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sean Simpson
Executive Director of IT, Cullman Regional Medical Center (Guest Contributor)
Network
Steps of a BumbleBee Intrusion to a Cobalt Strike
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
Detecting Unknown Ransomware: A Darktrace Case Study
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Emma Foulger
Senior Cyber Analyst
Network
Why St. Catharines Chose Darktrace for Digital Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Wayne Racey
Manager of IT Operations, City of St Catharines (Guest Contributor)
Network
The Risks of Remote Access Tools
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Dylan Hinz
Cyber Analyst
Network
Identifying PrivateLoader Network Threats
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Network
How Darktrace Antigena Thwarted Cobalt Strike Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Dylan Evans
Network
Analyzing Log4j Vulnerability in Crypto Mining Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Hanah Darley
Director of Threat Research
Network
Uncovering the Sysrv-Hello Crypto-Jacking Bonet
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Shuh Chin Goh
Network
Understanding Grief Ransomware Attacks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Oakley Cox
Director of Product
Network
How Darktrace AI Blocked Emotet Malspam
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Network
Confluence CVE-2022-26134 Zero-Day: Detection & Guidance
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Gabriel Few-Wiegratz
Product Marketing Manager, Exposure Management and Incident Readiness
Network
9 Stages of Ransomware & How AI Responds
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Dan Fein
VP, Product
Network
Stopping Trickbot: Darktrace's Autonomous Response
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Tony Jarvis
VP, Field CISO
Network
Log4Shell Vulnerability Detection & Response With Darktrace
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Max Heinemeyer
Global Field CISO
Network
GitLab Vulnerability Exploit Detected
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Analyzing the Resurgence of Ryuk Ransomware
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
What Are the Early Signs of a Ransomware Attack?
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Network
Why Most Ransomware Attacks Occur "After Hours"
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Max Heinemeyer
Global Field CISO