Security Blogs

Latest Articles

Not Just Annoying Ads: Adware Bundles Delivering Gh0st RAT
Security
8 Minute Read

Not Just Annoying Ads: Adware Bundles Delivering Gh0st RAT

Detect and defend against the Gh0st RAT and CloverPlus adware bundle – explore TTPs, persistence mechanisms, and actionable Splunk detection strategies.
Navigating NIS2 - Accelerating IT/OT Security in Manufacturing with Splunk, Claroty and AWS
Security

Navigating NIS2 - Accelerating IT/OT Security in Manufacturing with Splunk, Claroty and AWS

Explore the 3 biggest manufacturing challenges in 2026: NIS2 compliance, cyber risks, and IT/OT convergence. Learn how an integrated ecosystem from Claroty, AWS, and Splunk enables a secure risk reduction journey for your industrial operations. Stay resilient and compliant in a connected world.
Built for Speed, Stuck in Neutral: Why Splunk ES Deployments Stall
Security
10 Minute Read

Built for Speed, Stuck in Neutral: Why Splunk ES Deployments Stall

Why do Splunk Enterprise Security deployments stall? A Security TAM outlines five common pitfalls and how to unlock better outcomes.
Splunk Security Content for Threat Detection & Response: March Recap
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: March Recap

In March, the Splunk Threat Research Team had two releases of new security content via the Enterprise Security Content Update app.
The Certificate Decoding Illusion: How Blank Grabber Stealer Hides Its Loader
Security
15 Minute Read

The Certificate Decoding Illusion: How Blank Grabber Stealer Hides Its Loader

Analyze the BlankGrabber Trojan Stealer and learn how to detect its obfuscation, staging, and exfiltration techniques using Splunk security analytics.
The Evolution of the SOC: Moving from Reactive to Agentic with Enterprise Security at RSAC 2026
Security
8 Minute Read

The Evolution of the SOC: Moving from Reactive to Agentic with Enterprise Security at RSAC 2026

Announcing a series of major advancements within Splunk Enterprise Security (ES) designed to further reinforce Splunk ES as the AI-Powered, SecOps platform.
Top 50 Cybersecurity Threats
Security
5 Minute Read

Top 50 Cybersecurity Threats

Splunk's Top 50 Cybersecurity Threats is a practical field guide to the tactics and techniques shaping today’s threat landscape.
Splunk Security Content for Threat Detection & Response: February Recap
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: February Recap

In February, the Splunk Threat Research Team (STRT) had 2 releases of new security content via the Enterprise Security Content Update (ESCU) app (v5.21 and v5.22).
Why Your Network is Your Best Defense: A Complete Guide to Threat Detection, Investigation, and Response
Security
3 Minute Read

Why Your Network is Your Best Defense: A Complete Guide to Threat Detection, Investigation, and Response

Discover how to leverage your network for threat detection and response. Learn how Splunk and Cisco integrations reduce MTTD, MTTR, and MTTC in modern SOCs.