Security Blogs

Latest Articles

Strengthen Digital Resilience with Unified Security Operations
Security
4 Minute Read

Strengthen Digital Resilience with Unified Security Operations

Splunk Mission Control offers a unified, simplified, and modernized security operations experience which reduces complexity and reduces risk.
Overcome Cybersecurity Challenges to Improve Digital Resilience
Security
7 Minute Read

Overcome Cybersecurity Challenges to Improve Digital Resilience

Discover how embracing automation, unifying security operations and tackling security as a data problem helps organizations overcome the challenges posed to cybersecurity effectiveness and digital resilience.
Threat Advisory: SwiftSlicer Wiper STRT-TA03
Security
4 Minute Read

Threat Advisory: SwiftSlicer Wiper STRT-TA03

The Splunk Threat Research Team shares a closer look at the SwiftSlicer wiper, a new payload discovered by ESET and found in a recent January 2023 campaign.
Don’t boil the ocean: A technologist’s take on prioritisation in sustainability
Security
5 Minute Read

Don’t boil the ocean: A technologist’s take on prioritisation in sustainability

Even if manufacturing isn’t close to your heart, you’d have to be pretty cold not to care about sustainability in 2023. Let's get a technologist’s take on prioritisation in sustainability.
Splunk Observability & Security Weeks - Best Practices for Strong Cyber Resilience and Business Success
Security
1 Minute Read

Splunk Observability & Security Weeks - Best Practices for Strong Cyber Resilience and Business Success

This March, we are holding two weeks of virtual sessions across EMEA, packed with thought provoking and educational content to suit everyone. Whether your area of expertise is in security or IT & observability — we’ve got you covered.
Staff Picks for Splunk Security Reading February 2023
Security
3 Minute Read

Staff Picks for Splunk Security Reading February 2023

Explore the latest list of presentations, whitepapers, and customer case studies that our Splunk security experts feel are worth a read.
Fantastic IIS Modules and How to Find Them
Security
8 Minute Read

Fantastic IIS Modules and How to Find Them

This blog showcases how to enable and ingest IIS operational logs, utilize PowerShell scripted inputs to ingest installed modules and simulate AppCmd and PowerShell adding new IIS modules and disable HTTP logging using Atomic Red Team.
All the Proxy(Not)Shells
Security
7 Minute Read

All the Proxy(Not)Shells

The Splunk Threat Research Team walks through exploitation of ProxyShell and ProxyNotShell using MetaSploit, and hunts through data in Splunk to showcase different avenues for defenders to identify malicious activity.
Using MITRE ATT&CK in Splunk Security Essentials
Security
5 Minute Read

Using MITRE ATT&CK in Splunk Security Essentials

Discover how you can use the ATT&CK framework for a wide array of use cases and to answer a wide range of questions in Splunk Security Essentials (SSE).