Security Blogs

Latest Articles

Building a Cross-Functional Remote Employment Fraud Response Team
Security
7 Minute Read

Building a Cross-Functional Remote Employment Fraud Response Team

In this blog, Splunkers Jonathan Heckinger and Brian Starrs cover the most complex aspect of REF risk: what to do after you find it.
From Prompt to Payload: LAMEHUG’s LLM-Driven Cyber Intrusion
Security
10 Minute Read

From Prompt to Payload: LAMEHUG’s LLM-Driven Cyber Intrusion

The Splunk Threat Research Team analyzes the LAMEHUG malware, examining its tactics and techniques to provide insights that can help SOC analysts and blue teamers identify and respond.
Going Beyond Today’s Asset and Risk Intelligence: What’s New in Splunk ARI 1.2
Security
3 Minute Read

Going Beyond Today’s Asset and Risk Intelligence: What’s New in Splunk ARI 1.2

With the improvements within Splunk’s ARI 1.2, organizations can further improve aligning their vulnerabilities, misconfigurations, and threat activity with the business value of each asset.
Strengthen SOC Defenses with Native UEBA in Splunk Enterprise Security
Security
4 Minute Read

Strengthen SOC Defenses with Native UEBA in Splunk Enterprise Security

Splunk's enhanced UEBA capability, now natively available in ES, empowers SOCs to transition from reactive, fragmented workflows to a proactive, behavior-driven security posture.
Splunk Enterprise Security: Built to Empower Every SOC Analyst
Security
5 Minute Read

Splunk Enterprise Security: Built to Empower Every SOC Analyst

Announcing a transformative update to Splunk Enterprise Security (ES) with 8.2: An AI-powered SecOps platform designed to unify and accelerate threat detection, investigation, and response (TDIR) in one seamless experience.
Operationalize ESCU Detections Featuring Onboarding Assistant
Security
7 Minute Read

Operationalize ESCU Detections Featuring Onboarding Assistant

Master operationalizing Splunk ESCU detections in Splunk Enterprise Security using the Onboarding Assistant.
Splunk Security Content for Threat Detection & Response: August Recap
Security
3 Minute Read

Splunk Security Content for Threat Detection & Response: August Recap

Learn about the latest security content from Splunk.
Static Tundra Analysis & CVE-2018-0171 Detection Guide
Security
17 Minute Read

Static Tundra Analysis & CVE-2018-0171 Detection Guide

Protect your network from Static Tundra's exploitation of CVE-2018-0171 Cisco Smart Install vulnerability. Get comprehensive analysis & Splunk detection guidance.
Detecting Suspicious ESXi Activity Before Ransomware Happens
Security
11 Minute Read

Detecting Suspicious ESXi Activity Before Ransomware Happens

Learn to detect suspicious activity using Splunk, including log ingestion, common indicators, and comprehensive detection strategies for VMware ESXi environments.