false
Security Blogs
Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.

Latest Articles

Security 8 Min Read

Splunk and Tensorflow for Security: Catching the Fraudster with Behavior Biometrics

Raising the barrier for fraudsters and attackers: how to leverage Splunk and Deep Learning frameworks to discover Behavior Biometrics patterns within user activities
Security 2 Min Read

Punycode phishers - All you need to know

Unicode domains can be used for homograph attacks. Learn what they are and how users can be tricked.
Security 2 Min Read

Assigning Role Based Permissions in Splunk Enterprise Security

Learn how to add a new role in Enterprise Security and apply capabilities to it
Security 2 Min Read

Recap: Splunk @ Blackhat Europe 2016

Splunk at Blackhat Europe, a recap of schedule. Sharing latest tech on data analytics security, machine learning and threat intelligence gathering.
Security 2 Min Read

Playbook Series: Phishing: Automate and Orchestrate Your Investigation and Response

Respond with machine speed when a malicious phishing attack threatens your organization. Automation makes it possible.
Security 1 Min Read

Playbook: Investigate IP Address Performing Reconnaissance Activity

Phantom can receive reconnaissance alerts and automate key investigation steps to increase efficiency and speed decision making.
Security 3 Min Read

Detecting dynamic DNS domains in Splunk

While useful legitimately, hackers can use dynamic DNS domains to change IP address rapidly & exploit via malware-evil.duckdns[.]org; how to protect against?