Security Blogs
Latest Articles
template
category
category
security

Unify and Automate TDIR Workflows with Splunk SOAR 6.3 and Splunk Enterprise Security 8.0
Splunk SOAR 6.3 and Enterprise Security 8.0 make it easier to unify and automate your threat detection, investigation, and response workflows.

Splunk SOAR Prompt-Driven Automation: Reduce MTTR with Collaborative SecOps
Get started with prompt-driven automation today with the latest version of Splunk SOAR.

Announcing the General Availability of Splunk® Enterprise Security 8.0
We are thrilled to announce Splunk Enterprise Security 8.0 is now generally available.

Cybersecurity Awareness Month Spotlight: Insights from the Cisco Talos & SURGe Teams
The Cisco Talos and SURGe by Splunk teams gathered for a special episode of Talos Takes filled with engaging cybersecurity discussions and candid opinions.

ValleyRAT Insights: Tactics, Techniques, and Detection Methods
The Splunk Threat Research Team conducts an analysis for several variants of ValleyRAT’s malware samples to extract its MITRE ATT&CK tactics, techniques, and procedures (TTPs).

Fueling the SOC of the Future with Built-in Threat Research and Detections in Splunk Enterprise Security
The Splunk Threat Research Team develops security resources and content that helps enhance your ability to detect and respond to advanced threats.

Macro ATT&CK for a TTP Snack
Splunk's Mick Baccio and Ryan Fetterman explore 2024's macro-level cyber incident trends through the lens of the MITRE ATT&CK framework.

Introducing Splunk Attack Range v3.1
The Splunk Threat Research Team is happy to release v3.1 of Splunk Attack Range.

Vulnerability Prioritization Is a Treat for Defenders
There have been numerous high-profile cybersecurity incidents where vulnerability management had an impact on severe breaches – here are some notable examples.