Skip to main content
false

Security Blogs

Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.

Latest Articles

Security 10 Min Read

Cracking Braodo Stealer: Analyzing Python Malware and Its Obfuscated Loader

The Splunk Threat Research Team break down Braodo Stealer's loader mechanisms, obfuscation strategies, and payload behavior.
Security 4 Min Read

Paving the Way for Unified Cybersecurity: OCSF Joins the Linux Foundation with Splunk’s Support

Unified cybersecurity takes a step forward as OCSF joins the Linux Foundation, backed by Splunk’s support.
Security 1 Min Read

Splunk Enterprise Security 8.0: Customer Feedback

Splunk Enterprise Security 8.0 delivers unified workflows, alert aggregation, and detection versioning to empower security teams, shaped by customer feedback.
Security 1 Min Read

Introducing Wayfinder: Simplify Your Navigation in Splunk SOAR

Introducing Wayfinder, a new Splunk SOAR feature that streamlines navigation across the user interface and puts important data right at your fingertips.
Security 4 Min Read

Splunk Enterprise Security 8.0 and Splunk SOAR 6.3 Unify and Automate TDIR Workflows within the Market-Leading SIEM

John Dominguez explains how Splunk Enterprise Security is now natively integrated with automation capabilities from Splunk SOAR.
Security 4 Min Read

Logs Are for Campfires: This Is Your Data!

Splunker Jerald Perry shares how log data fuels insights, security, and efficiency, making it as impactful as Big Data for smarter decisions.
Security 2 Min Read

Guided Automation Using Real Incident Data for Easier Playbook Building in Splunk SOAR

Build powerful playbooks in Splunk SOAR faster and easier with guided automation, using real incident data to streamline security responses in seconds.
Security 6 Min Read

Federated Analytics: Analyze Data Wherever It Resides for Rapid and Holistic Security Visibility

Federated Analytics is now generally available as a premium add-on feature for Splunk Cloud Platform and Splunk Enterprise Security.
Security 2 Min Read

Unify and Automate TDIR Workflows with Splunk SOAR 6.3 and Splunk Enterprise Security 8.0

Splunk SOAR 6.3 and Enterprise Security 8.0 make it easier to unify and automate your threat detection, investigation, and response workflows.
Security 2 Min Read

Splunk SOAR Prompt-Driven Automation: Reduce MTTR with Collaborative SecOps

Get started with prompt-driven automation today with the latest version of Splunk SOAR.
Security 3 Min Read

Announcing the General Availability of Splunk® Enterprise Security 8.0

We are thrilled to announce Splunk Enterprise Security 8.0 is now generally available.
Security 3 Min Read

Cybersecurity Awareness Month Spotlight: Insights from the Cisco Talos & SURGe Teams

The Cisco Talos and SURGe by Splunk teams gathered for a special episode of Talos Takes filled with engaging cybersecurity discussions and candid opinions.
Security 12 Min Read

ValleyRAT Insights: Tactics, Techniques, and Detection Methods

The Splunk Threat Research Team conducts an analysis for several variants of ValleyRAT’s malware samples to extract its MITRE ATT&CK tactics, techniques, and procedures (TTPs).
Security 3 Min Read

Fueling the SOC of the Future with Built-in Threat Research and Detections in Splunk Enterprise Security

The Splunk Threat Research Team develops security resources and content that helps enhance your ability to detect and respond to advanced threats.
Security 3 Min Read

Macro ATT&CK for a TTP Snack

Splunk's Mick Baccio and Ryan Fetterman explore 2024's macro-level cyber incident trends through the lens of the MITRE ATT&CK framework.
Security 3 Min Read

Introducing Splunk Attack Range v3.1

The Splunk Threat Research Team is happy to release v3.1 of Splunk Attack Range.
Security 3 Min Read

Vulnerability Prioritization Is a Treat for Defenders

There have been numerous high-profile cybersecurity incidents where vulnerability management had an impact on severe breaches – here are some notable examples.
Security 14 Min Read

PowerShell Web Access: Your Network's Backdoor in Plain Sight

The Splunk Threat Research Teams dives deep into PowerShell Web Access (PSWA) exploring its functionality within the context of cyber threats.