Staff Picks for Splunk Security Reading June 2024

Security Audra Streetman

Hello, everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.

Check out our previous staff security picks, and we hope you enjoy.

>

Jithin Andoor

Linkedin

Exploiting ML models with pickle file attacks by Boyan Milanov

“A worthy read on how Python's pickle module is exploited by attackers to deploy malicious machine learning models. Attackers utilize tools like pickling to alter and insert malicious code into legitimate pickle files.”

Shannon Davis

@DrShannon2000 / LinkedIn

Mapping the Mind of a Large Language Model by Adly Templeton et al for Anthropic

“Anthropic's blog covers, at a high-level, how they managed to extract millions of features from one of their large language models (LLMs), Claude 3.0 Sonnet. The purpose of this research is to better understand the inner workings of the model, which in turn can help them make the models safer and potentially give greater operational visibility when they are running. For a more comprehensive read, Anthropic published their full paper on the study here, titled: ‘Scaling Monosemanticity: Extracting Interpretable Features from Claude 3 Sonnet.’”

Sydney Marrone

@letswastetime

Data Science & Exploratory Data Analysis: the Panda versus the Pony! by Alex Teixeira

“Exploratory data analysis is a task we often do when faced with a new dataset. I really enjoy the comparisons here between doing the data analysis outside of Splunk in Python AND with Splunk’s native SPL commands. It showcases how powerful Splunk is to have in your toolbox! Happy hunting!”

Justin Bull

Linkedin

Fake Google Chrome errors trick you into running malicious PowerShell scripts by Bill Toulas for Bleeping Computer

“We've often relied on indicators such as bad grammar, low resolution images, and vague messaging as a red flag, but it's getting more complicated. Here is one excerpt from the article: 'Although the attack chain requires significant user interaction to be successful, the social engineering is clever enough to present someone with what looks like a real problem and solution simultaneously, which may prompt a user to take action without considering the risk.’”

Mark Stricker

@maschicago

Teams of AI agents can exploit zero-day vulnerabilities by Pieter Arntz for ThreatDown

“Researchers at the University of Illinois tested a new way of using AI for hacking. In these experiments, instead of using a single LLM to discover zero day vulnerabilities, it used a hierarchy of AI agents. This method was 550% more effective at identifying zero days than the single LLM approach! This highlights the ability of AI to identify vulnerabilities quickly in order to address them before the software is released. Great stuff!”

Audra Streetman

@audrastreetman / @audrastreetman@infosec.exchange

Malicious activities linked to the Nobelium intrusion set by CERT-FR

“This report from CERT-FR outlines several cyberattacks attributed to Nobelium, a threat group linked to Russia’s foreign intelligence service, SVR. The cyberattacks include phishing lures targeting government and diplomatic entities along with the IT industry, most likely for espionage purposes. The targeting of IT and cybersecurity entities for espionage could strengthen Nobelium’s offensive capabilities and inform future operations, according to the report. This is especially timely in the lead up to the Paris Olympics.”

Related Articles

Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Hyperledger Fabric Security Monitoring with Splunk
Security
3 Minute Read

Hyperledger Fabric Security Monitoring with Splunk

In this post, we demonstrate how to set up effective security monitoring of your Hyperledger Fabric infrastructure. We identify some common threats, recognize key data sources to monitor, and walk through using Splunk to ingest and visualize your data.
The Certificate Decoding Illusion: How Blank Grabber Stealer Hides Its Loader
Security
15 Minute Read

The Certificate Decoding Illusion: How Blank Grabber Stealer Hides Its Loader

Analyze the BlankGrabber Trojan Stealer and learn how to detect its obfuscation, staging, and exfiltration techniques using Splunk security analytics.