Security Blogs

Latest Articles

Turning Hunts Into Detections with PEAK
Security
4 Minute Read

Turning Hunts Into Detections with PEAK

In this post, we’re going to look at something the PEAK framework refers to as the Hierarchy of Detection Outputs.
Staff Picks for Splunk Security Reading July 2023
Security
3 Minute Read

Staff Picks for Splunk Security Reading July 2023

Welcome to the July 2023 edition of our Splunk staff picks blog, featuring a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Amadey Threat Analysis and Detections
Security
8 Minute Read

Amadey Threat Analysis and Detections

The Splunk Threat Research Team shares a deep-dive analysis of the Amadey Trojan Stealer, an active and prominent malware that first emerged on the cybersecurity landscape in 2018 and has maintained a persistent botnet infrastructure ever since.