Security Blogs

Latest Articles

Splunk Security Content for Threat Detection & Response: February 2026 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: February 2026 Update

Stay ahead of cyber threats with the latest Splunk security content. Explore new analytic stories for Shadow AI, Kerberos coercion, and npm supply chain attacks.
Trust at Inference Time: Investigating GGUF Model Templates at Scale
Security
5 Minute Read

Trust at Inference Time: Investigating GGUF Model Templates at Scale

Discover the risks of inference-time poisoning in GGUF models. Learn how to detect malicious chat templates and monitor LLM metadata at scale for better security.
Splunk Attack Range v5
Security
5 Minute Read

Splunk Attack Range v5

Build instrumented cloud labs with Splunk Attack Range v5. Simulate attacks, generate telemetry, and test detections on AWS, Azure, and GCP using Docker and APIs.
Splunk Enterprise Security Premier is Now Generally Available: Delivering the Industry’s Best Analyst Experience
Security
5 Minute Read

Splunk Enterprise Security Premier is Now Generally Available: Delivering the Industry’s Best Analyst Experience

Splunk is proud to announce the general availability of Splunk Enterprise Security (ES) Premier for cloud customers.
When AI Tools Turn Against You: Operationalizing MCP Server Security with the Splunk MCP TA
Security
4 Minute Read

When AI Tools Turn Against You: Operationalizing MCP Server Security with the Splunk MCP TA

Learn how to secure Model Context Protocol (MCP) servers using the Splunk MCP TA.
TOTAL-REPLAY: The Bridge to Replay Attacks Using the Security Content Metadata
Security
5 Minute Read

TOTAL-REPLAY: The Bridge to Replay Attacks Using the Security Content Metadata

Learn how to use TOTAL-REPLAY to replay Splunk Attack Data logs. Validate detections, tune analytics, and map to MITRE ATT&CK without a full attack lab.
Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore
Security
5 Minute Read

Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore

UEBA excels at identifying small deviations in user and device behavior across authentication, data access, data movement, and privilege usage.
Splunking Isovalent Data: Initial Setup and Overview
Security
5 Minute Read

Splunking Isovalent Data: Initial Setup and Overview

The Splunk Threat Research Team walks through the lab setup, Splunk data ingestion, and initial exploration of Tetragon logs to establish our foundation.
Splunk Security Content for Threat Detection & Response: January Recap
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: January Recap

In January, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security Content Update (ESCU) app (v5.20).