/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Phishing Attacks: Protecting Against Them
Learn
7 Minute Read

Phishing Attacks: Protecting Against Them

Phishing attacks exploit social engineering to deceive victims into disclosing sensitive information or installing malware.
SBOMs: Software Bill of Materials, Explained
Learn
7 Minute Read

SBOMs: Software Bill of Materials, Explained

The software bill of materials (SBOM) lists all component parts and software dependencies used in application development and delivery.
Handala’s Wiper: Threat Analysis and Detections
Security
17 Minute Read

Handala’s Wiper: Threat Analysis and Detections

Cisco Talos and the Splunk Threat Research Team provide a comprehensive analysis that expands on existing coverage of Handala's Wiper and offers unique insights.