Security Blogs
Latest Articles
template
category
category
security

Not Just Annoying Ads: Adware Bundles Delivering Gh0st RAT
Detect and defend against the Gh0st RAT and CloverPlus adware bundle – explore TTPs, persistence mechanisms, and actionable Splunk detection strategies.

Navigating NIS2 - Accelerating IT/OT Security in Manufacturing with Splunk, Claroty and AWS
Explore the 3 biggest manufacturing challenges in 2026: NIS2 compliance, cyber risks, and IT/OT convergence. Learn how an integrated ecosystem from Claroty, AWS, and Splunk enables a secure risk reduction journey for your industrial operations. Stay resilient and compliant in a connected world.

Built for Speed, Stuck in Neutral: Why Splunk ES Deployments Stall
Why do Splunk Enterprise Security deployments stall? A Security TAM outlines five common pitfalls and how to unlock better outcomes.

Splunk Security Content for Threat Detection & Response: March Recap
In March, the Splunk Threat Research Team had two releases of new security content via the Enterprise Security Content Update app.

The Certificate Decoding Illusion: How Blank Grabber Stealer Hides Its Loader
Analyze the BlankGrabber Trojan Stealer and learn how to detect its obfuscation, staging, and exfiltration techniques using Splunk security analytics.

The Evolution of the SOC: Moving from Reactive to Agentic with Enterprise Security at RSAC 2026
Announcing a series of major advancements within Splunk Enterprise Security (ES) designed to further reinforce Splunk ES as the AI-Powered, SecOps platform.

Top 50 Cybersecurity Threats
Splunk's Top 50 Cybersecurity Threats is a practical field guide to the tactics and techniques shaping today’s threat landscape.

Splunk Security Content for Threat Detection & Response: February Recap
In February, the Splunk Threat Research Team (STRT) had 2 releases of new security content via the Enterprise Security Content Update (ESCU) app (v5.21 and v5.22).

Why Your Network is Your Best Defense: A Complete Guide to Threat Detection, Investigation, and Response
Discover how to leverage your network for threat detection and response. Learn how Splunk and Cisco integrations reduce MTTD, MTTR, and MTTC in modern SOCs.