Staff Picks for Splunk Security Reading June 2024

Hello, everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.

Check out our previous staff security picks, and we hope you enjoy.

>

Jithin Andoor

Linkedin

Exploiting ML models with pickle file attacks by Boyan Milanov

“A worthy read on how Python's pickle module is exploited by attackers to deploy malicious machine learning models. Attackers utilize tools like pickling to alter and insert malicious code into legitimate pickle files.”

Shannon Davis

@DrShannon2000 / LinkedIn

Mapping the Mind of a Large Language Model by Adly Templeton et al for Anthropic

“Anthropic's blog covers, at a high-level, how they managed to extract millions of features from one of their large language models (LLMs), Claude 3.0 Sonnet. The purpose of this research is to better understand the inner workings of the model, which in turn can help them make the models safer and potentially give greater operational visibility when they are running. For a more comprehensive read, Anthropic published their full paper on the study here, titled: ‘Scaling Monosemanticity: Extracting Interpretable Features from Claude 3 Sonnet.’”

Sydney Marrone

@letswastetime

Data Science & Exploratory Data Analysis: the Panda versus the Pony! by Alex Teixeira

“Exploratory data analysis is a task we often do when faced with a new dataset. I really enjoy the comparisons here between doing the data analysis outside of Splunk in Python AND with Splunk’s native SPL commands. It showcases how powerful Splunk is to have in your toolbox! Happy hunting!”

Justin Bull

Linkedin

Fake Google Chrome errors trick you into running malicious PowerShell scripts by Bill Toulas for Bleeping Computer

“We've often relied on indicators such as bad grammar, low resolution images, and vague messaging as a red flag, but it's getting more complicated. Here is one excerpt from the article: 'Although the attack chain requires significant user interaction to be successful, the social engineering is clever enough to present someone with what looks like a real problem and solution simultaneously, which may prompt a user to take action without considering the risk.’”

Mark Stricker

@maschicago

Teams of AI agents can exploit zero-day vulnerabilities by Pieter Arntz for ThreatDown

“Researchers at the University of Illinois tested a new way of using AI for hacking. In these experiments, instead of using a single LLM to discover zero day vulnerabilities, it used a hierarchy of AI agents. This method was 550% more effective at identifying zero days than the single LLM approach! This highlights the ability of AI to identify vulnerabilities quickly in order to address them before the software is released. Great stuff!”

Audra Streetman

@audrastreetman / @audrastreetman@infosec.exchange

Malicious activities linked to the Nobelium intrusion set by CERT-FR

“This report from CERT-FR outlines several cyberattacks attributed to Nobelium, a threat group linked to Russia’s foreign intelligence service, SVR. The cyberattacks include phishing lures targeting government and diplomatic entities along with the IT industry, most likely for espionage purposes. The targeting of IT and cybersecurity entities for espionage could strengthen Nobelium’s offensive capabilities and inform future operations, according to the report. This is especially timely in the lead up to the Paris Olympics.”

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.