Security Blogs
Latest Articles
template
category
category
security

Splunk Security Content for Threat Detection & Response: February 2026 Update
Stay ahead of cyber threats with the latest Splunk security content. Explore new analytic stories for Shadow AI, Kerberos coercion, and npm supply chain attacks.

Trust at Inference Time: Investigating GGUF Model Templates at Scale
Discover the risks of inference-time poisoning in GGUF models. Learn how to detect malicious chat templates and monitor LLM metadata at scale for better security.

Splunk Attack Range v5
Build instrumented cloud labs with Splunk Attack Range v5. Simulate attacks, generate telemetry, and test detections on AWS, Azure, and GCP using Docker and APIs.

Splunk Enterprise Security Premier is Now Generally Available: Delivering the Industry’s Best Analyst Experience
Splunk is proud to announce the general availability of Splunk Enterprise Security (ES) Premier for cloud customers.

When AI Tools Turn Against You: Operationalizing MCP Server Security with the Splunk MCP TA
Learn how to secure Model Context Protocol (MCP) servers using the Splunk MCP TA.

TOTAL-REPLAY: The Bridge to Replay Attacks Using the Security Content Metadata
Learn how to use TOTAL-REPLAY to replay Splunk Attack Data logs. Validate detections, tune analytics, and map to MITRE ATT&CK without a full attack lab.

Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore
UEBA excels at identifying small deviations in user and device behavior across authentication, data access, data movement, and privilege usage.

Splunking Isovalent Data: Initial Setup and Overview
The Splunk Threat Research Team walks through the lab setup, Splunk data ingestion, and initial exploration of Tetragon logs to establish our foundation.

Splunk Security Content for Threat Detection & Response: January Recap
In January, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security Content Update (ESCU) app (v5.20).