Security Blogs

Latest Articles

Splunk Wins Awards for SIEM, SOAR and More
Security
1 Minute Read

Splunk Wins Awards for SIEM, SOAR and More

Splunk wins four PeerSpot Tech Leader awards in the SIEM and SOAR categories. A special thanks goes out to all the reviewers who shared their Splunk experience.
See More, Act Faster, and Simplify Investigations with Customizable Workflows from Splunk Enterprise Security 7.2
Security
3 Minute Read

See More, Act Faster, and Simplify Investigations with Customizable Workflows from Splunk Enterprise Security 7.2

Introducing new capabilities that deliver an improved workflow experience for simplified investigations; enhanced visibility and reduced manual workload; and customized investigation workflows for faster decision-making.
Staff Picks for Splunk Security Reading September 2023
Security
3 Minute Read

Staff Picks for Splunk Security Reading September 2023

Our Splunk security experts curated their September 2023 list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Revisiting the Big Picture: Macro-level ATT&CK Updates for 2023
Security
5 Minute Read

Revisiting the Big Picture: Macro-level ATT&CK Updates for 2023

SURGe reviews the latest attacker trends and behaviors with this look at four years of ATT&CK data from some of the largest and most trusted threat reporting sources.
Defending the Gates: Understanding and Detecting Ave Maria (Warzone) RAT
Security
8 Minute Read

Defending the Gates: Understanding and Detecting Ave Maria (Warzone) RAT

The Splunk Threat Research Team provides a deep-dive analysis of Ave Maria RAT, also known as 'Warzone RAT.'
Mockbin and the Art of Deception: Tracing Adversaries, Going Headless and Mocking APIs
Security
9 Minute Read

Mockbin and the Art of Deception: Tracing Adversaries, Going Headless and Mocking APIs

Splunk's Threat Research Team delves into the attack's components, usage of tools like Mockbin and headless browsers, and provides guidance on detecting such activities.
Using metadata & tstats for Threat Hunting
Security
4 Minute Read

Using metadata & tstats for Threat Hunting

Behold the power of metadata and tstats commands! These commands will quickly provide situational awareness of your hosts and sourcetypes as you begin hunting.
Using stats, eventstats & streamstats for Threat Hunting…Stat!
Security
5 Minute Read

Using stats, eventstats & streamstats for Threat Hunting…Stat!

The stats command is a crucial capability when you’re threat hunting. And so are two related commands: eventstats & streamstats. Get all the details, right here.
Threat Hunting for Dictionary-DGA with PEAK
Security
6 Minute Read

Threat Hunting for Dictionary-DGA with PEAK

Explore applied model-assisted threat hunting for dictionary-based domain generation algorithms using the SURGe Security Research Team's PEAK Threat Hunting Framework.