Security Blogs

Latest Articles

Detecting dynamic DNS domains in Splunk
Security
3 Minute Read

Detecting dynamic DNS domains in Splunk

While useful legitimately, hackers can use dynamic DNS domains to change IP address rapidly & exploit via malware-evil.duckdns[.]org; how to protect against?
Back from FiRST Berlin, discover CIRCL Passive SSL
Security
2 Minute Read

Back from FiRST Berlin, discover CIRCL Passive SSL

Phishing – What does it look like in machine data?
Security
2 Minute Read

Phishing – What does it look like in machine data?

Phishing hits a new level of quality
Security
2 Minute Read

Phishing hits a new level of quality

Duqu 2.0 – The cyber war continues on a new level
Security
2 Minute Read

Duqu 2.0 – The cyber war continues on a new level

Monitoring and alerting for activities of expired user accounts
Security
2 Minute Read

Monitoring and alerting for activities of expired user accounts

Using Splunk for Your Vulnerability Management
Security
3 Minute Read

Using Splunk for Your Vulnerability Management

Contextualize your data with threat intelligence information from Project Honey Pot
Security
3 Minute Read

Contextualize your data with threat intelligence information from Project Honey Pot

Updated Keyword App
Security
1 Minute Read

Updated Keyword App