Skip to main content
false
shared header v2
Lucid Search Bar Implementation
Push Down Banner V1 Analytics Patch, remove after implementing V2 (S9 or S10)
Global nav V2 patch, remove after adding the mobile languages fix in the codebase (S7 or S8)
.conf & .conf Go
1 min read
The Splunkie Awards are back and more exciting than ever because for the first time this year, we’re bringing the Global Partner Awards to the Splunkies at .conf24.

Featured Articles

Security

Security
3 min read
Announcing Splunk Enterprise Security 7.3, delivering a refined analyst experience and enhanced risk context for seamless incident triage.
Security 11 Min Read

Hunting M365 Invaders: Navigating the Shadows of Midnight Blizzard

The Splunk Threat Research Team outlines the attack chain detailed in the Microsoft blog, offering practical detection and hunting tips for cybersecurity defenders.
Security 11 Min Read

Hypothesis-Driven Cryptominer Hunting with PEAK

A sample hypothesis-driven hunt, using SURGe's PEAK threat hunting framework, looking for unauthorized cryptominers.
Security 4 Min Read

Add to Chrome? - Part 1: An Analysis of Chrome Browser Extension Security

An overview of SURGe research that analyzed the entire corpus of public browser extensions available on the Google Chrome Web Store.
Security 10 Min Read

Enter The Gates: An Analysis of the DarkGate AutoIt Loader

The Splunk Threat Research Team (STRT) provides a deep dive analysis of the DarkGate malware and its use of AutoIt.

Learn

Latest Articles

Security 9 Min Read

Another Year of RATs and Trojan Stealer: Detection Commonalities and Summary

The Splunk Threat Research Team shares analysis, analytic stories and security detections for seven well-known RAT and Trojan Stealer malware families.
Security 4 Min Read

How Tech Executives Can Support Gender Diverse Cyber Talent

The number of unfilled cybersecurity roles creates a perfect opportunity for leaders to attract female talent at their organizations.
Learn 3 Min Read

Homomorphic Encryption: How It Works

Homomorphic encryption is a new way to protect data. Learn how homomorphic encryption reduces certain problems inherent in traditional decryption.
Learn 5 Min Read

DevOps Conferences & Events 2024: Complete Guide

Check out this article to explore the most popular DevOps conferences and events for 2024 around the world! Add your event, too, by getting in touch with us.
Learn 7 Min Read

The Best Security Conferences & Events 2024

Ready for in-person security conferences and events? Check out this roundup of 2024 security conferences, covering cybersecurity, InfoSec, SecOps and more.
Tips & Tricks 3 Min Read

Dashboard Studio Feature Highlights in Splunk Enterprise 9.2

Learn about new Dashboard Studio features in Splunk Enterprise 9.2 such as panel show/hide, new drill down options, and usability improvements!
Security 3 Min Read

Staff Picks for Splunk Security Reading January 2024

Welcome to the January Splunk staff picks blog – a curated list of presentations, whitepapers, and customer case studies that Splunk security experts feel are worth a read.
Leadership 2 Min Read

Reflections from Davos 2024

The World Economic Forum 2024 gathered under the theme of ‘Rebuilding Trust’. A theme of particular relevance for Splunk’s attendance this year is the emergence of genAI and the associated cybersecurity impact it will have. Splunk’s Petra Jenner shares her key takeaways from the event.
Security 5 Min Read

Security Insights: Jenkins CVE-2024-23897 RCE

In response to CVE-2024-23897, the Splunk Threat Research Team has developed new security detections and hunting queries to support defenders.