Security Blogs

Latest Articles

Breaking Down Termite Ransomware: Infection Methods and Detections
Security
8 Minute Read

Breaking Down Termite Ransomware: Infection Methods and Detections

Deep dive into Termite ransomware: Discover its infection methods, targeted vulnerabilities (like Cleo's CVE-2024-50623), and Splunk security detections.
Imposters at the Gate: Spotting Remote Employment Fraud Before It Crosses the Wire
Security
6 Minute Read

Imposters at the Gate: Spotting Remote Employment Fraud Before It Crosses the Wire

Remote Employment Fraud actors don’t steal credentials—they’re issued them. This blog explores early detection and why security can’t face this threat alone.
Australia Is Investing in Resilience – Are Businesses Ready?
Security
3 Minute Read

Australia Is Investing in Resilience – Are Businesses Ready?

Splunker Craig Bates explains why the most immediate — and underestimated — consequence of disruption isn’t always data loss. It’s downtime.
Cloak and Firewall: Exposing Netsh’s Hidden Command Tricks
Security
10 Minute Read

Cloak and Firewall: Exposing Netsh’s Hidden Command Tricks

Learn about hidden Netsh command tricks, detection methods, and Splunk security detections to protect your Windows systems.
A Data-Driven Approach to Windows Advanced Audit Policy – What to Enable and Why
Security
14 Minute Read

A Data-Driven Approach to Windows Advanced Audit Policy – What to Enable and Why

Maximize visibility without overwhelming your SIEM with this data-driven guide to Windows Advanced Audit Policy.
Splunk at RSAC™ 2025: Helping Users Build the SOC of the Future
Security
1 Minute Read

Splunk at RSAC™ 2025: Helping Users Build the SOC of the Future

Join Splunk at RSAC™ 2025 to discover cutting-edge security solutions for building the SOC of the Future. Explore data management, SIEM advancements, and more.
Supercharge Your SOC Investigations with Splunk SOAR 6.4
Security
4 Minute Read

Supercharge Your SOC Investigations with Splunk SOAR 6.4

Splunker Nick Hunter explains how to integrate Cisco Talos threat intelligence, leverage Azure scalability, and streamline investigations.
The High Cost of Security Investigations
Security
8 Minute Read

The High Cost of Security Investigations

Splunk Asset & Risk Intelligence (ARI) can significantly reduce investigation costs, improve analyst efficiency, and accelerate threat containment.
Splunk Security Ops: Building the Blueprint for Success
Security
3 Minute Read

Splunk Security Ops: Building the Blueprint for Success

Learn how Splunk Global Security runs ops at scale and enables the business by focusing on what matters—solving problems through data, automation, and collaboration.