Darktrace Blog Posts
Archive

Tous les blogs

Gestion de la surface d'attaque
Cloud
Apps
Zero Trust
HEAL
PREVENT
DETECT
Ask The Expert (ATE)
Proactive Threat Notifications (PTN)
Cyber AI Analyst
Apps - AWS
OT
Apps - Azure
Apps - Microsoft 365
Endpoint
Email
RESPOND
Network
Merci ! Votre soumission a été reçue !
Oups ! Un problème est survenu lors de la soumission du formulaire.
Default Darktrace Blog Post ImageBlog post image
Multi-Factor Authentication (MFA) has been widely adopted as a security measure against common account takeover methods. However, the industry is seeing more and more examples of MFA compromise wherein threat actors exploit the security tool itself to gain account access.
2023
Mar 21, 2023
Aucun élément trouvé.
Default Darktrace Blog Post ImageBlog post image
Between June 2021 and June 2022, crypto-currency platforms around the world lost an estimated 44 billion USD to cyber criminals, whose modus operandi range from stealing passwords and account recovery phrases, to cryptojacking and directly targeting crypto-currency transactions.
2023
Mar 15, 2023
Aucun élément trouvé.
Default Darktrace Blog Post ImageBlog post image
Compliance breaches can significantly damage a company’s finances and reputation if not properly addressed. However, compliance is often an afterthought for security teams responding to cyber security incidents, with many organizations seeing compliance issues as “rule breaking employees” rather than legitimate threats to their network. See here how Darktrace helps organizations adhere to compliance regulations.
2023
Mar 13, 2023
Email
Apps
Default Darktrace Blog Post ImageBlog post image
This blog explains the benefits of thinking like an attacker and modeling attack paths in order to understand where you need to invest your defenses.
2023
Feb 23, 2023
Aucun élément trouvé.
Default Darktrace Blog Post ImageBlog post image
As the prevalence of Software-as-a-Service (SaaS) and multi-factor authentication (MFA) as a primary vector of attack continues across a variety of organizations and of every size in multiple industries, it is more important now than ever for organizations to utilize every tool at their disposal to mitigate account compromise at the earliest possible stage.
2023
Feb 22, 2023
Email
Apps
Default Darktrace Blog Post ImageBlog post image
In the latter half of 2022, Darktrace observed a rise in Vidar Stealer infections across its client base. These infections consisted in a predictable series of network behaviors, including usage of certain social media platforms for the retrieval of Command and Control (C2) information and usage of certain URI patterns in C2 communications. In the blog post, we will provide details of the pattern of network activity observed in these Vidar Stealer infections, along with details of Darktrace’s coverage of the activity.
2023
Feb 10, 2023
Network
Default Darktrace Blog Post ImageBlog post image
Despite the market value of cryptocurrency itself decreasing in the final quarter of 2022, the number of known cryptocurrency mining software variants had more than trebled compared to the previous year. The intensive resource demands of mining cryptocurrency has exacerbated the trend of malicious hijacking third-party computers causing slower processing speeds and higher energy bills for many companies.
2023
Feb 27, 2023
Aucun élément trouvé.
Default Darktrace Blog Post ImageBlog post image
Financial institutions must follow specific IT security compliance standards, which regularly change. One credit union turned to Darktrace to align with its approach to compliance and risk, benefitting from email protection and proactive attack surface management. 
2023
Feb 3, 2023
Email
Network
Default Darktrace Blog Post ImageBlog post image
This blog post highlights the recent malvertising campaigns targeting Google searches that deploy info-stealer malware. It covers the attackers' techniques and provides a list of indicators of compromise. Recommendations for the general public are also included to help mitigate the risk of falling victim to such attacks.
2023
Jan 31, 2023
Aucun élément trouvé.
Default Darktrace Blog Post ImageBlog post image
In June 2022, Darktrace observed a surge in Qakbot infections across its client base. These infections, despite arising from novel delivery methods, resulted in unusual patterns of network traffic which Darktrace/Network was able to detect and respond to.
2023
Jan 31, 2023
Network
Email
Default Darktrace Blog Post ImageBlog post image
The 2022 Qatar World Cup introduced the world’s first ‘connected stadium’ concept whereby all eight stadiums were managed by a single unified technology. Discover why Darktrace was selected to help protect this global tournament from cyber-attacks.
2023
Jan 16, 2023
Network
OT
Default Darktrace Blog Post ImageBlog post image
Jack Stockdale, CTO at Darktrace looks back on a year of innovation from Darktrace's AI Research Centre.
2023
Jan 11, 2023
Aucun élément trouvé.
Default Darktrace Blog Post ImageBlog post image
As the new year begins, Darktrace customers look forward to tackling industry-specific challenges, using the time Darktrace saves them to launch new projects, and seeing how new tools can further benefit their environments.
2023
Jan 4, 2023
Aucun élément trouvé.
Default Darktrace Blog Post ImageBlog post image
All CISOs fear large and targeted attacks. It is during these threats which expect the most of security teams, that real-time alerting is not always enough. In this blog, analysts explore an incident of BlackMatter ransom where alerts were missed but actions from RESPOND could have stopped entirely.
2023
Jan 5, 2023
Aucun élément trouvé.
Default Darktrace Blog Post ImageBlog post image
A persistent security question in industry media concerns the insider threat- how do we detect it? This blog shares a case study highlighting how Darktrace is perfectly positioned to complement security teams and DETECT insider attacks.
2023
Jan 4, 2023
Network
Default Darktrace Blog Post ImageBlog post image
This blog explores the nuances of AI in cyber security, how to identify true AI, and considerations when integrating AI technology with people, processes, and other technology.
2022
Dec 21, 2022
Aucun élément trouvé.
Default Darktrace Blog Post ImageBlog post image
This blog explores the use of Darktrace PREVENT/ASM and Darktrace DETECT/Network as triage tools for security teams and the increased visibility provided when they complement each other. An example and mock scenario from an Australian environmental customer is also highlighted.
2023
Jan 3, 2023
Gestion de la surface d'attaque
Network
Default Darktrace Blog Post ImageBlog post image
This blog walks through five key trends we expect to observe in the cyber threat and cyber defense landscape in the next 12 months.
2022
Dec 14, 2022
Aucun élément trouvé.
Default Darktrace Blog Post ImageBlog post image
This blog walks through the key benefits of integrating EDR technologies with Darktrace.
2022
Dec 13, 2022
Endpoint
Default Darktrace Blog Post ImageBlog post image
This blog describes the internal and external cyber risks arising from mergers and acquisitions and how you can manage this with continuous AI-powered monitoring that outputs tangible and prioritized mitigation advice.
2022
1 décembre 2022
Aucun élément trouvé.
Default Darktrace Blog Post ImageBlog post image
This blog addresses the issue of alert fatigue and explains how Cyber AI Analyst breaks down billions of individual events, first into anomalous events and then into prioritized security incidents ready for the security team's review.
2022
Nov 30, 2022
Cloud
Network
OT
Endpoint
Apps
Default Darktrace Blog Post ImageBlog post image
This blog explores a low-and-slow incident which saw over 300GB of data exfiltrated from a customer network. Whilst this activity was ultimately stopped with the help of Darktrace services, it could have been prevented earlier had RESPOND been in autonomous mode.
2022
Dec 2, 2022
Network
Default Darktrace Blog Post ImageBlog post image
Out-of-hours attacks continue to be a large stress for security teams, however with RESPOND, companies can stop threats without the need for 24/7 human monitoring. This blog explores a nighttime incident where RESPOND triggered a decisive model breach but was prevented from acting without human input.
2022
Nov 24, 2022
RESPOND
Default Darktrace Blog Post ImageBlog post image
Misconfigurations - whether accidental or malicious - are a growing threat in the face of rapidly expanding digital footprints comprising of cloud assets and bespoke OT technology. This blog explains how these are uncovered and remediated with Darktrace PREVENT.
2022
Nov 22, 2022
Aucun élément trouvé.