Security Blogs

Latest Articles

Another Year of RATs and Trojan Stealer: Detection Commonalities and Summary
Security
9 Minute Read

Another Year of RATs and Trojan Stealer: Detection Commonalities and Summary

The Splunk Threat Research Team shares analysis, analytic stories and security detections for seven well-known RAT and Trojan Stealer malware families.
How Tech Executives Can Support Gender Diverse Cyber Talent
Security
4 Minute Read

How Tech Executives Can Support Gender Diverse Cyber Talent

The number of unfilled cybersecurity roles creates a perfect opportunity for leaders to attract female talent at their organizations.
Staff Picks for Splunk Security Reading January 2024
Security
3 Minute Read

Staff Picks for Splunk Security Reading January 2024

Welcome to the January Splunk staff picks blog – a curated list of presentations, whitepapers, and customer case studies that Splunk security experts feel are worth a read.
Security Insights: Jenkins CVE-2024-23897 RCE
Security
5 Minute Read

Security Insights: Jenkins CVE-2024-23897 RCE

In response to CVE-2024-23897, the Splunk Threat Research Team has developed new security detections and hunting queries to support defenders.
Security Insights: Tracking Confluence CVE-2023-22527
Security
6 Minute Read

Security Insights: Tracking Confluence CVE-2023-22527

In response to CVE-2023-22527, the Splunk Threat Research Team has developed new security detections to support defenders.
Security Insights: Investigating Ivanti Connect Secure Auth Bypass and RCE
Security
6 Minute Read

Security Insights: Investigating Ivanti Connect Secure Auth Bypass and RCE

The Splunk Threat Research Team has swiftly developed Splunk analytics and hunting queries, helping defenders quickly adapt and respond to emerging threats CVE-2023-46804 and CVE-2024-21887.
Hypothesis-Driven Cryptominer Hunting with PEAK
Security
11 Minute Read

Hypothesis-Driven Cryptominer Hunting with PEAK

A sample hypothesis-driven hunt, using SURGe's PEAK threat hunting framework, looking for unauthorized cryptominers.
AI: Keep Your Feet on the Ground
Security
1 Minute Read

AI: Keep Your Feet on the Ground

Splunk is excited about AI, but we're keeping our boots on the ground as we partner with customers to leverage AI to improve efficiency while continuing the essentials via Splunk’s platform.
Enter The Gates: An Analysis of the DarkGate AutoIt Loader
Security
10 Minute Read

Enter The Gates: An Analysis of the DarkGate AutoIt Loader

The Splunk Threat Research Team (STRT) provides a deep dive analysis of the DarkGate malware and its use of AutoIt.