Security Blogs
Latest Articles
template
category
category
security

Handala’s Wiper: Threat Analysis and Detections
Cisco Talos and the Splunk Threat Research Team provide a comprehensive analysis that expands on existing coverage of Handala's Wiper and offers unique insights.

ShrinkLocker Malware: Abusing BitLocker to Lock Your Data
The Splunk Threat Research Team shares their findings and methodologies to aid the cybersecurity community in combating ShrinkLocker effectively.

Previous Security Content Roundups from the Splunk Threat Research Team (STRT)
Recap: Learn about the last four quarters of security content from the Splunk Threat Research Team.

The Final Shell: Introducing ShellSweepX
The Splunk Threat Research Team is excited to announce the final tool in the ShellSweep collection: ShellSweepX.

Staff Picks for Splunk Security Reading August 2024
Splunk security experts share their curated list of presentations, whitepapers, and customer case studies that they feel are worth a read.

The New & Improved Splunk Guide to Risk-Based Alerting
Splunker Haylee Mills shares a brand new version of the step-by-step guide to success with the risk-based alerting framework.

Observability Meets Security: Build a Baseline To Climb the PEAK
Splunker James Hodgkinson looks at how to apply the baseline hunting process to some common O11y data sources and shows how the OpenTelemetry standard offers easier data analysis.

What Does Powering the Modern SOC Look Like in ANZ?
Splunker Craig Bates dives into what powering the modern SOC looks like in Australia and New Zealand.

Observability Meets Security: Tracing that Connection
Splunker James Hodgkinson looks at how you can use traces to see directly into the workings of an application to find a potential threat.