Security Blogs

Latest Articles

Playbook: Investigate IP Address Performing Reconnaissance Activity
Security
1 Minute Read

Playbook: Investigate IP Address Performing Reconnaissance Activity

Phantom can receive reconnaissance alerts and automate key investigation steps to increase efficiency and speed decision making.
8 reasons why you should splunk your backup solutions!
Security
2 Minute Read

8 reasons why you should splunk your backup solutions!

SSO without an Active Directory or LDAP provider
Security
4 Minute Read

SSO without an Active Directory or LDAP provider

Hackers are already in your environment – spot them with THOR and Splunk!
Security
2 Minute Read

Hackers are already in your environment – spot them with THOR and Splunk!

Random Words on Entropy and DNS
Security
4 Minute Read

Random Words on Entropy and DNS

Detecting dynamic DNS domains in Splunk
Security
3 Minute Read

Detecting dynamic DNS domains in Splunk

While useful legitimately, hackers can use dynamic DNS domains to change IP address rapidly & exploit via malware-evil.duckdns[.]org; how to protect against?
Back from FiRST Berlin, discover CIRCL Passive SSL
Security
2 Minute Read

Back from FiRST Berlin, discover CIRCL Passive SSL

Phishing – What does it look like in machine data?
Security
2 Minute Read

Phishing – What does it look like in machine data?

Phishing hits a new level of quality
Security
2 Minute Read

Phishing hits a new level of quality