Skip to main content
false

Security Blogs

Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.

Latest Articles

Security 3 Min Read

2022 Gartner Magic Quadrant for SIEM: Splunk Named a Leader for the 9th Consecutive Year

Splunk has been named a Leader in the 2022 Gartner Magic Quadrant for Security Information and Event Management, marking the ninth consecutive year for Splunk in the Leaders Quadrant.
Security 3 Min Read

Federated Search for Security

Splunker Johan Bjerke outlines some of the new security use cases Federated Search enables across Splunk deployments.
Security 2 Min Read

Detect Fraud Sooner with the Splunk App for Fraud Analytics

Leverage your data to detect, investigate and respond to fraud sooner with the Splunk App for Fraud Analytics.
Security 2 Min Read

APAC BOTS Day 2022

Welcome to Splunk APAC BOTS Day 2022!
Security 11 Min Read

Deliver a Strike by Reversing a Badger: Brute Ratel Detection and Analysis

The Splunk Threat Research Team shares how they utilized public research to capture Brute Ratel Badgers (agents) and create a Yara rule to help identify more on VirusTotal.
Security 3 Min Read

Staff Picks for Splunk Security Reading September 2022

Check out the latest staff picks from Splunk security experts, featuring presentations, whitepapers, and customer case studies that we feel are worth a read.
Security 7 Min Read

Machine Learning in Security: NLP Based Risky SPL Detection with a Pre-trained Model

The Splunk Threat Research Team shares a closer look at a hunting analytic and two machine learning-based detections that help find users running highly suspicious risky SPL commands.
Security 5 Min Read

Follina for Protocol Handlers

The Splunk Threat Research Team shares how to identify protocol handlers on an endpoint, different ways to simulate adversary tradecraft that utilizes a protocol handler, and a piece of inspiring hunting content to help defenders identify protocol handlers being used in their environment.
Security 1 Min Read

Americas' BOTS Day '22

With less than a month to go before Americas' BOTS Day '22, we thought it would be the perfect time to explain what’s happening and how the day will go.
Security 24 Min Read

AppLocker Rules as Defense Evasion: Complete Analysis

The Splunk Threat Research Team analyzes 'Azorult loader' (a payload that imports its own AppLocker rules) to understand the tactics and techniques that may help defend against these types of threats.
Security 2 Min Read

Staff Picks for Splunk Security Reading August 2022

Check out the latest staff picks from our Splunk security experts, featuring a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Security 2 Min Read

Introducing the Ransomware Content Browser

Learn more about the Ransomware Content Browser recently released inside Splunk Security Essentials, aimed at helping customers combat the problem of ransomware.
Security 3 Min Read

Splunk Announces Participation in the Open Cybersecurity Schema Framework (OCSF) Project

Announcing our participation as a co-founder of the new public Open Cybersecurity Schema Framework (OCSF) open-source project at Black Hat 2022.
Security 2 Min Read

Security Made Stronger with Splunk User Behavior Analytics (UBA) Version 5.1

Announcing the availability of User Behavior Analytics (UBA) version 5.1
Security 2 Min Read

Staff Picks for Splunk Security Reading July 2022

Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Security 6 Min Read

ML Detection of Risky Command Exploit

Discover how to use machine learning algorithms to develop methods for detecting misuse or abuse of risky SPL commands to further pinpoint a true security threat.
Security 2 Min Read

Splunk Security Essentials 3.6.0: A Holistic View of Your Security

Check out all the new features being released in Splunk Security Essentials 3.6.0.
Security 3 Min Read

3 Important German BSI Documents Every SIEM & SOC Manager Needs To Know About

The German IT Security Act 2.0 (IT-SiG 2.0) has been in force for some time now. Due to this new law, significantly more German companies have been classified as operators of critial infrastructures (KRITIS) than ever. This is a major cause of headaches for many managers. In addition, IT departments are starting to ask themselves: "Are we now regarded as KRITIS"? And if so, "What do we have to take into consideration?" Splunker Matthias Maier shares the 3 most important BSI documents every SIEM and SOC manager needs to know about.