Staff Picks for Splunk Security Reading December 2022

Hello, everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.

Check out our previous staff security picks, and we hope you enjoy.

Floris Ladan

Exercise Crossed Swords 2022 Kicks Off! by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)

"In partnership with Splunk, CCDCOE started the 2022 Crossed Swords exercise. This exercise brings together around 120 participants from 24 countries, both from NATO and non-NATO countries and is being conducted at the exercise and training centre CR14 in Tallinn, Estonia."

Tamara Chacon

Twitter Thread about Car Hacking by Sam Curry

"This thread from Sam Curry is a great breakdown of the investigation by him and his team into vulnerabilities affecting various car manufacturers. Without going into any spoilers, the investigation involved a company you might not realize provides vehicle telematics. The thread details the OSINT techniques used to confirm the vulnerability, which allowed the researchers to remotely unlock, start, and locate several remotely connected vehicles knowing only the VIN number. It's a fun thread looking into car security."

Ryan Fetterman

@iknowuhack

Playing Cat and Mouse with the Attacker: Frequent Item Set Mining in the Registry by Maeve Mulholland, Tim Nary, and Fred Frey at SnapAttack

"This month I've been catching up on the great content from CAMLIS. In this talk, Maeve Mulholland from SnapAttack describes a method of "Item Set Mining" to identify unique clusters of registry keys that are tied to an attacker's persistence mechanism. I really like the way this talk acknowledges the difficulty in security data science of capturing the true level of variance an attacker has in how they implement each step of an attack. This methodology seems promising as a means for uncovering more behavioral detection possibilities!"

Sydney Howard

@letswastetime

The Anatomy of a Threat Hunting Hypothesis by Lauren Proehl

"Building a great hypothesis for threat hunting can be difficult. Scope creep is common and ensuring relevancy to your environment is critical. While there are lots of aspects to consider, at the heart of it you need a few key elements. This blog by Lauren Proehl breaks it down in a clear way by using hypothesis diagramming to build strong hypotheses for your threat hunts. Happy hunting!"

Shannon Davis

@DrShannon2000 / @DrShannon2000@infosec.exchange

The Saga of The Well, the World's Most Influential Online Community by Katie Hafner for WIRED

"First off, this is a WIRED Backchannel article written in 1997. But reading this feels very akin to what we're going through with the mass-migration from Twitter to Mastodon. It's a very long read, but I think sometimes we need to spend the time digesting pieces like these to actually gain something meaningful from them."

Mark Stricker

@Mark_Stricker

Lack of Cybersecurity Expertise Poses Threat for Public-Safety Orgs by Robert Lemos for Dark Reading

"Police and emergency responders are among the most vulnerable to cyberattacks, such as ransomware and data leaks. But they handle the most sensitive data, and literally have our lives in their hands. This article covers some of the reasons why. This a problem that must be addressed."

Audra Streetman

@audrastreetman / @audrastreetman@infosec.exchange

Apple Plans New Encryption System to Ward Off Hackers and Protect iCloud Data by Robert McMillan, Joanna Stern, and Dustin Volz at the Wall Street Journal

"In a win for privacy advocates, Apple announced it is expanding end-to-end encryption to include the iCloud with an optional feature called Advanced Data Protection. The move was met with criticism by the FBI, which would no longer be able to access end-to-end encrypted iCloud data with a warrant. Users who opt-in to the feature will need to choose a data-recovery method, since Apple will be restricted in its ability to restore lost data. It's worth noting that, according to this report, Apple Mail, Contacts and Calendar won't qualify for Advanced Data Protection because they use older technology protocols. I'm also excited to see that Apple users will soon be able to log in to their accounts using hardware-based security keys, like the YubiKey."

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.