Staff Picks for Splunk Security Reading May 2024

Hello, everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.

Check out our previous staff security picks, and we hope you enjoy.

Shannon Davis

@DrShannon2000

The Ethics of Advanced AI Assistants by Iason Gabriel et al for Google DeepMind

"A very long whitepaper – 273 pages – about the ethics of advanced AI assistants authored by a number of individuals from Google and numerous universities. I'm only a short way through, but I believe this is one of the most comprehensive attempts to put these ideas down on paper so far. If you want to understand the ethics surrounding the use of these tools along with proposals on how to deal with them, read on! I recommend a long-haul flight or maybe even use this long paper as an excuse to avoid doing other stuff for an entire day, it's really up to you!"

Justin Bull

Linkedin

How Attackers Can Own a Business Without Touching the Endpoint by The Hacker News

"’Digital identities are increasingly complicated and hard to secure.’ - The emergence of technology in our everyday lives has brought with it the battle between security and complexity. The ease-of-use of the things we need to use presents difficulty in providing those things securely. As cloud technology has become more widely adopted, it has also taken the enterprise perimeter from local or regional to global."

Brandon Sternfield

@TheLawsOfChaos

Rethinking How You Work With Detection and Response Metrics by Jeffrey Schwartz for Dark Reading

"Alert fatigue is a significant challenge for SOC analysts. This article discusses a new framework proposed to help SOCs balance the quantity and quality of detections to mitigate this issue. The Threat Detection and Response (TDR) Maturity Model, introduced by Stott, a Senior Staff Engineer at Airbnb and a presenter at Black Hat Europe, aims to help organizations prioritize the MITRE ATT&CK techniques that are most relevant to their critical risks. Stott's SAVER (Streamlined, Awareness, Vigilance, Exploration, and Readiness) Framework is designed to improve the development of metrics. He believes that implementing both frameworks will enable organizations to accurately assess their detection and response maturity and guide future investments to enhance these capabilities. Interested individuals can sign up to view the recorded webinar here.”

Mark Stricker

@maschicago

Microsoft’s AI ‘Recall’ feature raises security, privacy concerns by Laura French for SC Media

"Microsoft announced a new feature this week that has some folks’ spidey sense tingling. Their new co-pilot PCs are coming with a feature called ‘Recall’ that takes snapshots of the user's activity every few seconds. This is concerning because it would seem to present a big target for bad actors. While the data is local (and encrypted), it doesn't strip out sensitive data. This is an interesting article about privacy and security concerns surrounding this feature."

Robin Burkett

Linkedin

Using ideas from game theory to improve the reliability of language models by Rachel Gordon for MIT CSAIL

“This is an interesting article that explains how to use aspects of game theory to improve how AI understands and generates text. It’s similar to when you are learning something new and how it helps to approach similar concepts from different perspectives. MIT CSAIL researchers created a “consensus game” that pits two different AI approaches against each other until they are in agreement, creating a more reliable and consistent model.”

David Montero-Suárez

LinkedIn

Cyber Security: A Pre-War Reality Check by Bert Hubert

“Sobering read. I am Costa Rican and we don't have military forces. Although we don't go to war anymore, war still comes to us. Cyber threats do not differentiate. We know, we were hacked two years ago… but even if you think there’s only a 10% chance of conflict, it’s still good to think about this.”

Audra Streetman

@audrastreetman / @audrastreetman@infosec.exchange

Potent youth cybercrime ring made up of 1,000 people, FBI official says by AJ Vicens for CyberScoop

“The cybercriminal group behind a number of high-profile attacks including MGM Resorts and Caesars Entertainment is made up of about a thousand people, CyberScoop reports. Bryan Vorndran, assistant director of the FBI’s Cyber Division, revealed this information at Sleuthcon, a cybercrime-focused conference, adding that Scattered Spider is made up of mostly English speakers in the US and UK and is classified as a top three cybersecurity threat alongside China and Russia.”

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.