false
Security Blogs
Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.

Latest Articles

Security 5 Min Read

Revisiting the Big Picture: Macro-level ATT&CK Updates for 2023

SURGe reviews the latest attacker trends and behaviors with this look at four years of ATT&CK data from some of the largest and most trusted threat reporting sources.
Security 8 Min Read

Defending the Gates: Understanding and Detecting Ave Maria (Warzone) RAT

The Splunk Threat Research Team provides a deep-dive analysis of Ave Maria RAT, also known as 'Warzone RAT.'
Security 9 Min Read

Mockbin and the Art of Deception: Tracing Adversaries, Going Headless and Mocking APIs

Splunk's Threat Research Team delves into the attack's components, usage of tools like Mockbin and headless browsers, and provides guidance on detecting such activities.
Security 5 Min Read

Using stats, eventstats & streamstats for Threat Hunting…Stat!

The stats command is a crucial capability when you’re threat hunting. And so are two related commands: eventstats & streamstats. Get all the details, right here.
Security 4 Min Read

Using metadata & tstats for Threat Hunting

Behold the power of metadata and tstats commands! These commands will quickly provide situational awareness of your hosts and sourcetypes as you begin hunting.
Security 6 Min Read

Threat Hunting for Dictionary-DGA with PEAK

Explore applied model-assisted threat hunting for dictionary-based domain generation algorithms using the SURGe Security Research Team's PEAK Threat Hunting Framework.
Security 4 Min Read

Deep Learning in Security: Text-based Phishing Email Detection with BERT Model

We introduced a large language model (LLM)-based phishing email detector integrated into the Splunk DSDL app. We provide details on model training and evaluation, comparisons to other machine learning and deep learning algorithms as well as deployment approaches to Splunk in this blog.
Security 9 Min Read

Sharing is Not Caring: Hunting for Network Share Discovery

This post offers a practical guide to enhancing detection strategies against network share discovery, a technique often used by threat actors.
Security 4 Min Read

Staff Picks for Splunk Security Reading August 2023

Splunk security experts share a list of presentations, whitepapers, and customer case studies from August 2023 that they feel are worth a read.
Security 4 Min Read

Key Threat Hunting Deliverables with PEAK

When most people think of threat hunting, they think of uncovering unknown threats – but that is only one of many (better) reasons to show value with threat hunting.
Security 4 Min Read

Unified Strategies Across IT and Security for Cutting-Edge Detection, Investigation and Response

Splunk's Mike Horn shares a closer look at the value of a unified approach to security and observability.
Security 8 Min Read

Detecting Lateral Movement Using Splunk User Behavior Analytics

The blog is to introduce lateral movement detection using Splunk User Behavior Analytics (UBA)
Security 1 Min Read

Integrated Intelligence Enrichment With Threat Intelligence Management

Threat Intelligence Management enables analysts to fully investigate security events or suspicious activity by providing the relevant and normalized intelligence to better understand threat context and accelerate time to triage.
Security 4 Min Read

Using Splunk Stream for Hunting: Finding Islands in the Stream (of Data)

Let's look at how to use the popular Splunk Stream App for our favorite purpose: threat hunting! This is part of our Threat Hunting with Splunk series.
Security 2 Min Read

Splunk SOAR Playbook of the Month: Investigations with Playbooks

For this month’s edition of Playbook of the Month, we’ll look at how you can perform investigations at machine speed using Splunk SOAR and one of our investigation playbooks, Internal Host WinRM Investigate.
Security 2 Min Read

Unveiling Splunk UBA 5.3: Power and Precision in One Package

Splunk celebrates the launch of User Behavior Analytics (UBA) 5.3, introducing the 20 Node XL cluster, innovative Splunk UBA models, and essential system and security upgrades.
Security 2 Min Read

That Was Easy! Manage Lookup Files and Backups With the Splunk App for Lookup File Editing

The 4.0.1 release of the App for Lookup File Editing helps users mitigate issues with new features such as a backup size limit and dashboards for tracking backup size.