Darktrace has completed the acquisition of Cado Security.
Read the announcement press release here
Platform
Products
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Comprehensive risk management
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber AI Analyst
Investigates every alert like a human analyst, at the speed and scale of AI
Darktrace Services
Maximize your security investments with 24/7 expert support and incident management from our global SOC team.
Our AI
Resources
Customers
Blog
Events
Inside the SOC
The Inference
Glossary
All resources
White paper
The AI Arsenal: Understanding the Tools Shaping Cybersecurity
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partners
Overview
Partner Portal
Technology Partners
Integrations
Featured Partners
Microsoft
AWS
Mclaren
Products
Overview
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Defend critical systems
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/Proactive Exposure Management
/Attack Surface Management
/Incident Readiness & Recovery
Cyber AI Analyst
Services
Our AI
Resources
All Resources
Customers
Blog
Events
The Inference
Inside the SOC
Glossary
Company
About us
Contact
Careers
Leadership
News
Federal
Academy
SDR Academy
Legal
Partners
Overview
Partner Portal
Technology Partners
Become a Partner
Integrations
Microsoft
AWS
Mclaren
Get a demo
Get a demo
Get a demo
Register now
Darktrace / IDENTITY blog
Exploring app security
Stay current on the latest news and insights about securing the app environment.
Latest blog posts
Blog
Detecting and Containing Account Takeover with Darktrace
Account takeovers are rising with SaaS adoption. Learn how Darktrace detects deviations in user behavior and autonomously stops threats before they escalate.
Blog
Bytesize Security: Insider Threats in Google Workspace
Insider threats pose significant risks due to access to internal systems. Darktrace detected a former employee attempting to steal data from the customer’s Google Workspace platform. Learn about this threat here.
Blog
Behind the Veil: Darktrace's Detection of VPN Exploitation in SaaS Environments
A recent phishing attack compromised an internal email account, but Darktrace’s advanced AI quickly intervened. By identifying unusual activity across email and SaaS environments, Darktrace uncovered the attacker’s use of VPNs to mask their location and shut down the threat.
Blog
Thread Hijacking: Infiltration Tactics Explained
Read about thread hijacking and how attackers exploit trusted conversations, compromising network security and user data. Stay informed.
Blog
Attack Trends: VIP Impersonation in the Business Hierarchy
VIP Impersonation occurs when a cyber-threat actor impersonates a prominent employee to obtain sensitive data. Learn all about VIP impersonation here.
Blog
How Darktrace Halted A DarkGate in MS Teams
Discover how Darktrace thwarted DarkGate malware in Microsoft Teams. Stay informed on the latest cybersecurity measures and protect your business.
Blog
How Darktrace Stopped an Account Hijack Fast
Learn how Darktrace detected an account hijack within days of deployment. Discover the strategies used to protect against cyber threats.
Blog
PerfectData Software Abuse and Account Takeover Risks
Darktrace investigates several attacks through PerfectData Software on Microsoft 365 accounts and shows how we were able to prevent full account takeovers.
Blog
Darktrace Stops Large-Scale Account Hijack
Learn how Darktrace detected and stopped a large-scale account hijack that led to a phishing attack. Protect your business with these insights.
Blog
Multi-Factor Authentication: Not the Silver Bullet
Multi-Factor Authentication (MFA) is a widely used security measure, but it's not bulletproof. See how threat actors can exploit MFA to access your information.
Blog
Account Hijack Prevention: Detect, Respond & Escalate
Learn how to detect, respond, and escalate to prevent further compromise for account hijacks. Get Darktrace's expert insights on cybersecurity strategies.
Blog
Understanding The Threat of Social Engineering
Learn why MFA and security awareness fall short and how Self-Learning AI can enhance your cyber defense strategy.
Blog
Multi-Account Compromise in Office 365
Learn how internal phishing can compromise accounts swiftly & how Darktrace/Apps can prevent future attacks effectively.
Blog
How AI Keeps Priefert Productive and Secure
Find out how AI empowers Priefert Manufacturing to stay productive and secure, with insights from Darktrace.
Blog
Multi-Account Hijack Detection with AI
Discover the analysis of a sophisticated SaaS-based attack using Microsoft 365 accounts. Learn how attackers launch & maintain their offensive strategies.
Use Cases
Blog
Customer Stories
Integrations
Get a demo