Security Blogs

Latest Articles

Using Splunk to Detect Sunburst Backdoor
Security
8 Minute Read

Using Splunk to Detect Sunburst Backdoor

The Sunburst Backdoor threat truly burst on the scene as a send off for 2020. The good news is that the Splunk Security team has produced detections you can run in Splunk Enterprise Security to help you protect your environment from this sophisticated threat.
CI/CD Detection Engineering: Failing, Part 3
Security
4 Minute Read

CI/CD Detection Engineering: Failing, Part 3

In part 3 of our now 4-part series, we walk you through how we failed to use CircleCI to continually test detentions!
7 High-Risk Events to Monitor Under GDPR: Lessons Learned from the ICO’s BA Penalty Notice
Security
5 Minute Read

7 High-Risk Events to Monitor Under GDPR: Lessons Learned from the ICO’s BA Penalty Notice

British Airways made the headlines when they were hacked, customer details stolen and were issued a Penalty Notice by the UK ICO. Matthias Maier took a closer look at the document and recapitulated the key takeaways any IT security person can learn from.
Detecting Ryuk Using Splunk Attack Range
Security
6 Minute Read

Detecting Ryuk Using Splunk Attack Range

A new alert, Ransomware Activity Targeting the Healthcare and Public Health Sector, issued by the CISA poses ongoing and possible imminent attacks against the healthcare sector. Learn how you can detect the Ryuk ransomware as payload with Splunk Attack Range.
Detecting Google Cloud Platform OAuth Token Abuse Using Splunk
Security
5 Minute Read

Detecting Google Cloud Platform OAuth Token Abuse Using Splunk

Google Cloud Platform's Identity Access Management (IAM) permissions can be used to move laterally and escalate privileges. Learn how to detect GCP OAuth token abuse and remediate these events with Splunk.
Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range
Security
5 Minute Read

Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range

Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched or lack mitigations in place. Learn how to prevent and detect CVE-2020-1472 using Splunk Attack Range.
Adaptable Incident Response With Splunk Phantom Modular Workbooks
Security
5 Minute Read

Adaptable Incident Response With Splunk Phantom Modular Workbooks

Modular Workbooks allow you to effortlessly adapt your security operations workflow. Learn how Splunk Phantom SOAR can help divide tasks into phases, assign responsibilities to team members, and document your work.
Introducing a New Splunk Add-On for OT Security
Security
2 Minute Read

Introducing a New Splunk Add-On for OT Security

The Splunk Add-on for OT Security expands existing Splunk Enterprise Security frameworks to improve security visibility in OT environments for our customers, partners and community members.
Using Splunk to Detect Abuse of AWS Permanent and Temporary Credentials
Security
7 Minute Read

Using Splunk to Detect Abuse of AWS Permanent and Temporary Credentials

In this blog, the Splunk threat research team shows how to detect suspicious activity and possible abuse of AWS Permanent and Temporary credentials.