Darktrace Blog Posts
Archive
All Posts
감사합니다! 제출되었습니다!
양식을 제출하는 동안 문제가 발생했습니다.
This blog discusses how Darktrace detected examples of the 3CX supply chain compromise, the first known cascading supply chain compromise. Leveraging integrations with security vendors like CrowdStrike and SentinelOne, Darktrace was able to successfully identify and prevent multiple cases of the 3CX supply chain compromise across its customer base.
2023
Jun 19, 2023
네트워크
Generative AI: How Darktrace AI protects 8,400 customers from security and privacy risks
by
잭 스톡데일 OBE
This blog describes how Darktrace DETECT and RESPOND can help organizations reduce privacy and security risks related to generative AI.
2023
Jun 12, 2023
항목을 찾을 수 없습니다.
While 94% of all cyber-attacks come through the inbox, their destination is almost never email. Attacks often traverse to other areas, like cloud apps and infrastructure, endpoints, or networks. As a result, although security teams must establish a strong cornerstone of email security, they should also consider how those solutions fit into the wider security posture.
2023
Apr 17, 2023
이메일
This blog demonstrates the relationship between Microsoft Defender and Darktrace security solutions. It takes a deep dive into the relationship between Darktrace DETECT, RESPOND, and Microsoft Defender, providing real examples as to how the two are able to integrate with each other and support security teams.
2023
Apr 11, 2023
항목을 찾을 수 없습니다.
This blog outlines the challenges faced by security teams in protecting organizations from email-based attacks. It explores how a modern, AI-based security solution can tackle these pain points with targeted autonomous action, frictionless UIs, optimized workflows and full visibility of account users.
2023
Apr 2, 2023
이메일
In the latter half of 2022, Darktrace observed a rise in Vidar Stealer infections across its client base. These infections consisted in a predictable series of network behaviors, including usage of certain social media platforms for the retrieval of Command and Control (C2) information and usage of certain URI patterns in C2 communications. In the blog post, we will provide details of the pattern of network activity observed in these Vidar Stealer infections, along with details of Darktrace’s coverage of the activity.
2023
Feb 9, 2023
네트워크