Tag: Splunk Enterprise Security
Latest Articles
displayMode
paginated
filter
tags
tags
Splunk Enterprise Security
showImagesOnMobile
false
limit
9

Security
5 Minute Read
Visual Link Analysis with Splunk: Part 3 - Tying Up Loose Ends
Using Splunk for Link Analysis part 3, addressing loose ends with visual link analysis.

Security
7 Minute Read
Detecting Supernova Malware: SolarWinds Continued
Supernova exposes SolarWinds Orion to attack via an in-memory web shell. It needs to be patched and detections below can help identify adversary actions.

Security
8 Minute Read
Using Splunk to Detect Sunburst Backdoor
The Sunburst Backdoor threat truly burst on the scene as a send off for 2020. The good news is that the Splunk Security team has produced detections you can run in Splunk Enterprise Security to help you protect your environment from this sophisticated threat.
Security
6 Minute Read
Detecting Ryuk Using Splunk Attack Range
A new alert, Ransomware Activity Targeting the Healthcare and Public Health Sector, issued by the CISA poses ongoing and possible imminent attacks against the healthcare sector. Learn how you can detect the Ryuk ransomware as payload with Splunk Attack Range.

Security
5 Minute Read
Detecting Google Cloud Platform OAuth Token Abuse Using Splunk
Google Cloud Platform's Identity Access Management (IAM) permissions can be used to move laterally and escalate privileges. Learn how to detect GCP OAuth token abuse and remediate these events with Splunk.

Security
5 Minute Read
Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range
Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched or lack mitigations in place. Learn how to prevent and detect CVE-2020-1472 using Splunk Attack Range.

Platform
4 Minute Read
Splunking Azure: NSG Flow Logs
Splunking NSG flow log data will give you access to detailed telemetry and analytics around network activity to & from your NSG's.

Security
5 Minute Read
Adaptable Incident Response With Splunk Phantom Modular Workbooks
Modular Workbooks allow you to effortlessly adapt your security operations workflow. Learn how Splunk Phantom SOAR can help divide tasks into phases, assign responsibilities to team members, and document your work.

Security
2 Minute Read
Introducing a New Splunk Add-On for OT Security
The Splunk Add-on for OT Security expands existing Splunk Enterprise Security frameworks to improve security visibility in OT environments for our customers, partners and community members.
/en_us/blog/fragments/subscribe-footer