Security Blogs
Latest Articles
template
category
category
security

The Certificate Decoding Illusion: How Blank Grabber Stealer Hides Its Loader
Analyze the BlankGrabber Trojan Stealer and learn how to detect its obfuscation, staging, and exfiltration techniques using Splunk security analytics.

The Evolution of the SOC: Moving from Reactive to Agentic with Enterprise Security at RSAC 2026
Announcing a series of major advancements within Splunk Enterprise Security (ES) designed to further reinforce Splunk ES as the AI-Powered, SecOps platform.

Top 50 Cybersecurity Threats
Splunk's Top 50 Cybersecurity Threats is a practical field guide to the tactics and techniques shaping today’s threat landscape.

Splunk Security Content for Threat Detection & Response: February Recap
In February, the Splunk Threat Research Team (STRT) had 2 releases of new security content via the Enterprise Security Content Update (ESCU) app (v5.21 and v5.22).

Why Your Network is Your Best Defense: A Complete Guide to Threat Detection, Investigation, and Response
Discover how to leverage your network for threat detection and response. Learn how Splunk and Cisco integrations reduce MTTD, MTTR, and MTTC in modern SOCs.

Splunking Isovalent Data: Attack Simulations and Detections
Detect Kubernetes threats with Cisco Isovalent eBPF telemetry and Splunk. Explore real-world attack simulations, from port scans to privilege escalation.

Breaking Trust in MMC: XMLDriven Malicious Loader via .MSC Files
Learn how attackers abuse Microsoft Management Console (.msc) files and XML loaders to execute malware. Discover detection strategies using Splunk and MITRE ATT&CK.

From Expert Systems to Agentic AI: The Evolution of AI in Cybersecurity
We explore AI’s journey through decades of innovation to see how it has reshaped the cybersecurity landscape — and what it takes to stay a step ahead.

Reinventing the Incident Responder's Day: Empowering Tier 2 SOC Analysts with Splunk's Agentic SOC Platform
Splunk Agentic SOC platform is purpose-built to transform the demanding world of the SOC team, making day-to-day tasks significantly easier and more effective.