Announcing General Availability of Cisco Talos Intelligence in Splunk Attack Analyzer

While it’s always hard to pick a favorite, if you asked the customers attending .conf24 what new product announcement they were most excited about, the integration of Cisco Talos threat intelligence into Splunk’s security products would likely feature near the top of their list.

Today, we are pleased to announce the general availability of Cisco Talos threat intelligence to all Splunk Attack Analyzer customers globally.

Splunk Attack Analyzer Overview

Splunk Attack Analyzer automates analysis of suspected malware and credential phishing threats, such as emails with embedded QR codes, threats behind captchas, lure docs impersonating known brands, and more. Its unique capabilities allow security analysts to:

As a result, Splunk Attack Analyzer helps security analysts better understand active threats, reduce alert volumes, enhance detection efficiency, and accelerate investigations and decision-making for rapid resolution. For example, with Splunk Attack Analyzer, Southern Farm Bureau Life Insurance Company has:

Splunk Attack Analyzer and Cisco Talos Integration

Cisco Talos is a proven and trusted threat intelligence research team comprised of world-class researchers, analysts and engineers with unmatched visibility across the threat landscape, seeing more than 800 billion security events per day, 2000 new malware samples per minute and 2000 domains blocked per second.

Intelligence from Cisco Talos allows Splunk Attack Analyzer to detect net new threats, particularly those that are ephemeral in nature, and might already be taken down before they reach Splunk Attack Analyzer for analysis. Integrating with Cisco Talos allows Splunk Attack Analyzer to leverage Cisco’s rich threat intelligence and enrich URLs discovered in the attack chain with reputation results. Each URL analyzed by Splunk Attack Analyzer receives a threat level and threat category from Cisco Talos.

These capabilities are globally enabled for all Splunk Attack Analyzer customers and do not require any configuration for customers to realize further improvements to their threat detection efficacy.

Integration of Cisco Talos threat intelligence with Splunk Attack Analyzer

Following the announcement at .conf24, several customers had expressed their excitement about this integration. “We're excited to get additional depth of analysis by integrating Talos Threat Intelligence into Splunk Attack Analyzer. This will help us be more confident in automated actions we take and continue to bring the best of Splunk and Cisco together.” says Tony Iacobelli, Sr. Manager of Advanced Threat Response at Splunk.

Learn More About Splunk Attack Analyzer

Ready to automate threat analysis? We’ve got you covered! Visit the Splunk Attack Analyzer webpage or speak to your account manager to learn more.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.