false
Registration for .conf25 is open! Join us in Boston September 8–11.
Registration for .conf25 is open! Join us in Boston September 8–11.
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Platform 1 Min Read

Get Involved: Start Contributing to Splunk Technology Add-Ons!

Join the Splunk Technology Add-ons Community Contribution program to help enhance Splunk TAs with bug fixes, features, and improved data onboarding.
Security 2 Min Read

Splunk Security Content for Threat Detection & Response: June Recap

Learn about the latest security content from Splunk.
Security 16 Min Read

When Installers Turn Evil: The Pascal Script Behind Inno Setup Malware Campaign

Uncover the Inno Setup malware campaign leveraging Pascal scripting to deliver RedLine Stealer.
Security 4 Min Read

Threat Hunting with TLS/SSL Certificates

TLS and SSL certificates are a great way to hunt advanced adversaries. Collect them with Splunk Stream, Bro, or Suricata and hunt in your own data!
Learn 6 Min Read

Human in the Loop (HITL) in Practice: A Guide to Core HITL Concepts, Benefits, and Effective AI Collaboration

Learn more about HITL. Human in the Loop is the crucial role of human intervention in an automated or AI-driven process.
Security 6 Min Read

How To Use CloudTrail Data for Security Operations & Threat Hunting

This blog post reviews AWS cloudtrail as a security logging source and how to hunt in it
Security 4 Min Read

Hunting with SA-Investigator & Splunk Enterprise Security (SIEM)

Discover how Splunk Enterprise Security and the SA-Investigator add-on empower analysts to streamline threat hunting and incident response. Learn how to pivot across assets, identities, and processes for deep-dive investigations and actionable insights. Happy hunting!
Security 7 Min Read

Hunting for Threats in VPCFlows

This article will look at native AWS network telemetry — VPCFlows. We’ll explore what it is, how you can ingest it, and what value it provides from a security perspective.
Security 13 Min Read

XWorm's Shape-Shifting Arsenal: Loader and Stager Variants in the Wild

Explore XWorm's shape-shifting tactics, evolution, and persistence, and how Splunk helps detect this RAT.