Staff Picks for Splunk Security Reading August 2022

Hello, everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.

Check out our previous staff security picks, and we hope you enjoy.

Ryan Kovar

@meansec

Threat Landscape for Ransomware Attacks by the European Union Agency for Cybersecurity (ENISA)

"ENISA released a wonderful piece of research around the current state of open-source intelligence observed ransomware. I think this whitepaper should be required reading for cybersecurity teams (especially CISOs) who are trying to defend their networks against ransomware. It is chuckfull of useful facts and figures custom-made for reporting to boards of directors for more funding. A perfect example was their finding that “33% of the stolen data includes employee PII and 18.3% includes customer PII,” a figure that will surely strike fear into any CEO’s heart. I also enjoyed how they extended the ransomware lifecycle with frank discussion around the ransom and negotiation phase of the attack. Furthermore, the paper does a great job of breaking down modern ransomware-as-a-service and intrusion brokering as the new normal of these criminals. The only critique is that the paper depends on open-source curated intelligence of ransomware intrusions but it does an admiral job of explaining methods/procedures and I find no fault in the data as they present it!"

Mark Stricker

@maschicago

Black Hat and DEFCON Roundup by Threatpost

"August was a big month for cybersecurity with both the Black Hat and DEFCON conferences in Las Vegas. One of the alarming hacks was the Zoom MacOS vulnerability discussed by cybersecurity researcher Patrick Wardle. This vulnerability allows a hacker to gain access to the entire macOS operating system. The vulnerability was patched this month, but a workaround to the patch was quickly found. A second patch has been released to address that. Mac users, make sure to update your Zoom software!"

Chris Perkins

Relentless vulnerabilities and patches induce cybersecurity burnout by Matt Kapko at Cybersecurity Dive

"Maintaining optimism and positivity when confronting a lopsided battle from a weakened position is important. Matt Kapko, the author of this article, accurately points out that when teams celebrate successes and incorporate intentional training and mentoring, they are energized. It's incredibly important to train as a team as well. Testing the tools and communicating while going through exercises will also directly contribute to energy, optimism, and positivity."

Dean Luxton

@sec_din

Save the Environment (Variable) by Wietze Beukema

"This is an excellent blog about the novel environmental variable DLL Hijacking technique introduced at DEFCON 30 by the impressive @Wietze. I wonder if T1574.007 is going to be renamed, or if we will see a new sub-technique created..."

Audra Streetman

@audrastreetman

Computer Hacks in the Russia-Ukraine War by Kenneth Geers

"This paper by Dr. Kenneth Geers for his talk at DEFCON provides a great overview of publicly-known computer network operations (CNO) related to Russia's invasion of Ukraine. This includes pro-Russia and pro-Ukraine operations along with the work of allies and 'cyber volunteers.' The hacks outlined in this paper vary from DDoS and defacement to spearphishing campaigns and wiper malware. Geers also includes his observations from the war about how network defense has evolved, the importance of allied support, and the opportunities decentralized warfare presents for both attackers and defenders."

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.