Staff Picks for Splunk Security Reading April 2022

Hello, everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers and customer case studies that we feel are worth a read.

Check out all monthly staff security picks and our evergreen picks for security books and articles. We hope you enjoy.

Drew Church

@drewchurch

11 Strategies of a World-Class Cybersecurity Operations Center by Kathryn Knerler and Ingrid Parker at The MITRE Corporation Carson Zimmerman at Microsoft

"In 2016 I started a full-court press into educating myself on HOW the upper echelon of successful organizations "do" security. A colleague of mine made me aware of the book titled "10 Strategies of a World-Class Cybersecurity Operations Center" and I was enamored. It really glued together the why and how of the organizations I'd seen in my work. In March 2022, The MITRE Corporation published a second edition that encompasses a total of 11 strategies. For anyone interested in the structure of a security program with actionable insights, start reading it today."

Haylee Mills

@7thdrxn

A twitter thread on Cyberhactivism and Russia by Micah Lee

"I had heard little tidbits of releases on Distributed Denial of Secrets here and there, but it's wild to see the sustained hacktivism against the Russian government and private industry. There's even a person in the comments talking about folks who have been organizing to crack communication protocols and SCADA systems! Hell hath no fury like a hacker scorned."

Shannon Davis

@DrShannon2000

Episode 114: HD from Jack Rhysider at Darknet Diaries

"This is a great Darknet Diaries podcast, which was really just a fireside chat with HD Moore around some of his history and how Metasploit came to be. Was really interesting to hear the story directly from HD, who is super humble even though he created one of the greatest red team tools in existence."

Tamara Chacon

@holly1g0lightly

NFTs Are a Privacy and Security Nightmare The blockchain isn’t as “anonymous” as you might think by Eric Ravenscraft at WIRED

"The world of crypto is interesting. It allows you to be “anonymous” by using a false name, address, or other PII that you would like to keep private. You have a wallet that is viewable, people can see what that wallet is doing, but it is harder to see who is using that wallet. With NFTs on the rise, anonymity is more difficult simply because the entire point of an NFT is it being a “unique identifiable token." The article by Eric Ravenscraft touches on why NFTs are creating privacy and security nightmares for crypto users. It brings up simple points that many have been overlooked in this new chapter of digital currency. The article brought to light things I did not know could take place within the crypto world."

Audra Streetman

@audrastreetman

Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure by CISA, FBI, NSA, and International Partners

"The Cybersecurity and Infrastructure Security Agency issued a joint Cybersecurity Advisory this month that it calls 'the most comprehensive view of the cyber threat posed by Russia to critical infrastructure released by government cyber experts since the invasion of Ukraine in February.' The advisory includes technical details on cyber operations from Russian cybercrime groups and state-sponsored actors. Based on evolving intelligence, CISA says it appears the Russian government is exploring options for potential cyberattacks against the West. The advisory also recommends several immediate actions organizations can take to protect their networks such as patching known vulnerabilities, enforcing MFA, monitoring RDP, and providing security awareness training for end-users. Organizations can also visit cisa.gov/shields-up for the latest guidance on how to defend against potential cyberattacks."

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.