Tag: Surge
Latest Articles
displayMode
paginated
filter
tags
tags
Surge
showImagesOnMobile
false
limit
9

Security
3 Minute Read
Parsing Domains with URL Toolbox (Just Like House Slytherin)
One of the most popular Splunk security apps of all time, URL Toolbox’s URL parsing capabilities have been leveraged by thousands. Full story here.

Security
5 Minute Read
Using eval to Calculate, Appraise, Classify, Estimate & Threat Hunt
This article discusses a foundational capability within Splunk — the eval command. Need to pick a couple commands for your desert island collection? eval should be one!

Security
4 Minute Read
Using RegEx for Threat Hunting (It’s Not Gibberish, We Promise!)
Another excellent tool for your threat hunting: RegEx! SPL offers two commands for utilizing regular expressions in Splunk searches. See how to do it here.

Security
6 Minute Read
Stat! 3 Must-Have Data Filtering Techniques
To hunt for threats, there's a lot of data you do NOT need. Here are the 3 must-have data filtering techniques so you can hunt those threats STAT!

Security
5 Minute Read
Revisiting the Big Picture: Macro-level ATT&CK Updates for 2023
SURGe reviews the latest attacker trends and behaviors with this look at four years of ATT&CK data from some of the largest and most trusted threat reporting sources.

Security
4 Minute Read
Using metadata & tstats for Threat Hunting
Behold the power of metadata and tstats commands! These commands will quickly provide situational awareness of your hosts and sourcetypes as you begin hunting.

Security
6 Minute Read
Threat Hunting for Dictionary-DGA with PEAK
Explore applied model-assisted threat hunting for dictionary-based domain generation algorithms using the SURGe Security Research Team's PEAK Threat Hunting Framework.

Security
4 Minute Read
Key Threat Hunting Deliverables with PEAK
When most people think of threat hunting, they think of uncovering unknown threats – but that is only one of many (better) reasons to show value with threat hunting.

Learn
5 Minute Read
Quantum-Safe Cryptography & Standards: QSC, PQC, QKD & More!
Quantum-safe cryptography sounds complicated. Expert Kirsty Paine defines quantum-safe cryptography, differentiates PQC & QKD, and talks NIST post-quantum process.
/en_us/blog/fragments/subscribe-footer