Security Blogs

Latest Articles

Introducing DECEIVE: A Proof-of-Concept Honeypot Powered by AI
Security
4 Minute Read

Introducing DECEIVE: A Proof-of-Concept Honeypot Powered by AI

Explore DECEIVE: an AI-powered proof-of-concept honeypot by SURGe. Learn how AI simplifies cybersecurity with dynamic simulations and session summaries, paving the way for innovative security solutions.
Now Available: Splunk Enterprise Security Content Update App 5.0
Security
4 Minute Read

Now Available: Splunk Enterprise Security Content Update App 5.0

The Splunk Threat Research Team announces the release of the Enterprise Security Content Update (ESCU) app 5.0.
Cloud SOAR Achieves IRAP Assessment Along With Enterprise Security 8.0, DMX Edge Processor & Federated Search S3
Security
1 Minute Read

Cloud SOAR Achieves IRAP Assessment Along With Enterprise Security 8.0, DMX Edge Processor & Federated Search S3

We are delighted to announce that our Cloud SOAR solution has successfully completed the IRAP assessment.
Matching AI Strengths to Blue Team Needs
Security
6 Minute Read

Matching AI Strengths to Blue Team Needs

Discover how AI and Large Language Models (LLMs) enhance cybersecurity operations for Blue Teams.
Logs Are for Campfires: Splunk’s Asset and Risk Intelligence Leaves No Vulnerability Undiscovered!
Security
3 Minute Read

Logs Are for Campfires: Splunk’s Asset and Risk Intelligence Leaves No Vulnerability Undiscovered!

Splunk's Asset and Risk Intelligence enhances security by uncovering hidden vulnerabilities, prioritizing critical threats, and offering dynamic risk scoring for proactive risk mitigation and compliance.
Harness the Power of Cisco Talos Threat Intelligence Across Splunk Security Products
Security
4 Minute Read

Harness the Power of Cisco Talos Threat Intelligence Across Splunk Security Products

Leverage Cisco Talos’ threat intelligence through Cisco Talos Intelligence for Enterprise Security, the Cisco Talos Intelligence connector for Splunk SOAR, and as a globally enabled feature in Splunk Attack Analyzer.
The Modern SIEM Has Come a Long Way From Your Grandmother’s SIEM
Security
2 Minute Read

The Modern SIEM Has Come a Long Way From Your Grandmother’s SIEM

Explore how modern SIEM solutions tackle scalability, alert fatigue, and advanced threat detection with automation, machine learning, and real-time insights for efficient SOC workflows.
Meduza Stealer Analysis: A Closer Look at its Techniques and Attack Vector
Security
18 Minute Read

Meduza Stealer Analysis: A Closer Look at its Techniques and Attack Vector

Uncover Meduza Stealer, a 2023 malware targeting credentials and crypto wallets. Explore its evasion tactics, attack methods, and Splunk’s expert insights for enhanced security.
Cisco Intends to Acquire Threat Detection and Defense Company SnapAttack, Driving Further Splunk Innovation to Power the SOC of the Future
Security
2 Minute Read

Cisco Intends to Acquire Threat Detection and Defense Company SnapAttack, Driving Further Splunk Innovation to Power the SOC of the Future

Cisco announces it intent to acquire threat detection and defense company SnapAttack, driving further Splunk innovation to power the SOC of the future.