Staff Picks for Splunk Security Reading January 2021

Howdy, folks! A new month, so a new list of security picks! Splunk security nerds (employees and customers) like to make things. They like to make LOTS of things. But sometimes...they get lost! So as we promised in early 2018, we are bringing you some golden security nuggets you might not have seen before. These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read.

Check out our monthly staff security picks and our all-time best picks for security books and articles. I hope you enjoy.

Ryan Kovar

@ meansec

Consider all outcomes before taking a step, and spend your life on one leg.

Advanced Painting with Data: Choropleth SVG by Splunk's Ryan O'Connor

This is a little bit of a different security pick for me. Years and years ago, when I was still a Splunk customer, I was desperate to get D3 visualizations going in Splunk. At the time, Splunk legend Nate McKervey was my PS consultant, and we hounded him for years on the subject! Eventually, a now deprecated feature called escape hatch was developed, which gave me the flexibility that I needed to do D3 OUTSIDE of Splunk, but I still yearned for sexy SVG viz inside of Splunk. The recent work done by the UI/UX team at Splunk shows how this is possible! This excellent blog by Ryan O'Connor at Splunk gives some great examples of the new SVG capabilities and links back to the Splunk Dashboard Example app. If you haven't dusted off your Stephen Few and Edward Tufte books for a couple of years, I recommend you do so and start making Security visualizations! I'm now itching to make an org tree image and having the "gauge" fill up the business units to show their patching levels! Imagine walking into a SOC and seeing that!

Matt Toth

@ willhackforfood

Expect the worst, it's the least you can do.

Not your grandparent's watering hole... by Dan Goodin

When discussing hacks and attacks, we often think of the malware, vulnerability or the aftermath. One aspect that often gets overlooked is the reconnaissance an adversary does to make sure they hit their intended target. The recent hacking operation detailed by Google Project Zero, utilized a watering-hole attack and four zero-day exploits to hit their targets. A watering-hole attack is when an adversary compromises a website that they believe their target will visit, with the objective of infecting the target when it does visit the site. The exploit chains used in this specific attack are impressive, and the research team does a good job of detailing the exploits. Be aware that an adversary will do their research to determine how to attack you (what sites you visit, who you are connected to on LinkedIn, what OS's you use, etc), and that by limiting the data available to them, it makes you a harder target.

Damien Weiss

@ damienweiss

People are noticing you! Try wearing pants more often.

The Mac Malware of 2020 by Patrick Wardle

The fact that we can have an article titled, "Mac Malware of 2020" and it be readable in twenty minutes means two things. First, Macs have held up well under the assault of malware writers, and second Macs are not invulnerable to malware. If you've been voluntold to start monitoring Macs at your workplace, there is a dearth of material available. Luckily, Patrick Wardle has stepped in and done an amazing job of documenting the threats to the platform and how to find and defend against them.

John Stoner

@ stonerpsu

You are 192,239th in line for COVID Vaccine

CrowdStrike Services Cyber Front Lines Report by Crowdstrike

This year end report snuck out at the end of December 2020, but with the Solorigate efforts, holidays and the like, this may have gotten overlooked and I couldn't let that happen, so my pick for January is the Crowdstrike Service Cyber Front Lines Report. I will preface that Crowdstrike will prompt you for an email address to gain access to the report, but I found the report to be interesting and useful. Basically, this report takes outcomes and findings from their previous year's incident response engagements and discusses those findings thematically and then looks ahead to the coming year. A couple of key stats that I found interesting included the dwell time of the adversary is down to 79 days, with some organizations getting down to a week but others going longer than six months! Another interesting data point is that 68% of organizations encountered another sophisticated intrusion attempt in the next year. Crowdstrike rolls these findings into six themes to think about in the coming year with some thoughts about how to take action to counter these challenges. Like any report, you might read a section, and say, yeah I knew that, but in terms of looking at a broader set of incident response engagements and looking for themes and ideas of where to improve your security posture, this one is a good one to check out!

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.