Latest Articles
displayMode
paginated
category
Security
showImagesOnMobile
false

Security
5 Minute Read
Using eval to Calculate, Appraise, Classify, Estimate & Threat Hunt
This article discusses a foundational capability within Splunk — the eval command. Need to pick a couple commands for your desert island collection? eval should be one!

Security
4 Minute Read
Using RegEx for Threat Hunting (It’s Not Gibberish, We Promise!)
Another excellent tool for your threat hunting: RegEx! SPL offers two commands for utilizing regular expressions in Splunk searches. See how to do it here.

Security
8 Minute Read
Compliance Essentials for Splunk 2.1.0
Announcing the latest on Compliance Essentials for Splunk, an essential part of your toolkit to help your organization maintain and monitor your compliance status and cyber resiliency with various frameworks.

Security
6 Minute Read
Stat! 3 Must-Have Data Filtering Techniques
To hunt for threats, there's a lot of data you do NOT need. Here are the 3 must-have data filtering techniques so you can hunt those threats STAT!

Security
5 Minute Read
Enhance Security Resilience Through Splunk User Behavior Analytics VPN Models
This blog introduces new machine learning models in Splunk UBA for VPN connection monitoring to enhance WFH security resilience.

Security
10 Minute Read
More Than Just a RAT: Unveiling NjRAT's MBR Wiping Capabilities
The Splunk Threat Research Team (STRT) provides a deep-dive analysis of NjRAT (or Bladabindi), a Remote Access Trojan (RAT) discovered in 2012 that's still active today.

Security
5 Minute Read
Detect WS_FTP Server Exploitation with Splunk Attack Range
The Splunk Threat Research Team shares how they used Splunk Attack Range to develop detection content related to CVE-2023-40044.

Security
4 Minute Read
Staff Picks for Splunk Security Reading October 2023
Splunk security experts share their list of presentations, whitepapers, and customer case studies from October 2023 that they feel are worth a read.

Security
3 Minute Read
Educating the Next Generation of Cyber Defenders
Splunk's Eric Fusilero emphasizes the need for cyber defender education and aligns with the National Cyber Workforce Strategy, offering training and scholarships.