Security Blogs

Latest Articles

Ransomware Groundhog Day: Elevating Your Program in a High-Threat Environment
Security
3 Minute Read

Ransomware Groundhog Day: Elevating Your Program in a High-Threat Environment

REvil attackers exploited Kaseya, a highly trusted management software. Here's how security leaders can take actionable steps to improve your business's defenses.
REvil Ransomware Threat Research Update and Detections
Security
8 Minute Read

REvil Ransomware Threat Research Update and Detections

On July 2, 2021, REvil group used Kaseya to distribute malware to its on-premises customers. Splunk has pushed out guidance to help understand and detect REvil. Learn more about the REvil ransomeware group, their tactics, and how to detect them using Splunk.
Kaseya, Sera. What REvil Shall Encrypt, Shall Encrypt
Security
19 Minute Read

Kaseya, Sera. What REvil Shall Encrypt, Shall Encrypt

Kaseya VSA, remote monitoring management (RMM) software heavily used by managed service providers (MSP), was compromised by REvil, and is being used to distribute ransomware to its on-premises customers. Find out more on how to detect REvil in your environment.
Fashionably Late: The Zero Trust Trend is Here to Stay
Security
3 Minute Read

Fashionably Late: The Zero Trust Trend is Here to Stay

Whether you were hip to the zero trust trend before it started being cool, or are arriving fashionably late, learn how to leverage a data-driven approach to achieve zero trust outcomes and improve the overall security capabilities of the organization in the process.
I Pity the Spool: Detecting PrintNightmare CVE-2021-34527
Security
7 Minute Read

I Pity the Spool: Detecting PrintNightmare CVE-2021-34527

Read on for details around Detect PrintNightmare (CVE-2021-34527), a critical vulnerability that affects the Print Spooler service and can perform remote code execution.
Staff Picks for Splunk Security Reading June 2021
Security
5 Minute Read

Staff Picks for Splunk Security Reading June 2021

SOARing to the Clouds with Splunk SOAR
Security
2 Minute Read

SOARing to the Clouds with Splunk SOAR

Now available as part of Splunk Cloud, Splunk SOAR further delivers on our promise to modernize security operations – read on to learn more.
Introducing the World’s First Modern Cloud-Based SecOps Platform: Splunk Security Cloud
Security
3 Minute Read

Introducing the World’s First Modern Cloud-Based SecOps Platform: Splunk Security Cloud

Announcing the new Splunk Security Cloud – the only data-centric modern security operations platform that delivers enterprise-grade advanced security analytics, automated security operations, and threat intelligence with an open, unparalleled ecosystem.
Splunk SOAR Playbooks: GCP Unusual Service Account Usage
Security
4 Minute Read

Splunk SOAR Playbooks: GCP Unusual Service Account Usage

In this new Splunk SOAR Playbook, we'll show how a Splunk Enterprise search can trigger automated enrichment, an analyst prompt, and rapid response actions to prevent damage caused by malicious account access.