Hello and welcome! Every month, our Splunk staff of security experts share their favorite reads of the month — this way, you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Here, we'll share a variety of articles, original research, presentations, whitepapers, and customer case stories. Topics that may be covered in these hand-picked reads may include:
We've been running this Security Picks series for years, and now we're making some updates: bookmark this URL, because we'll be making all of our recommendations here moving forward. So, anytime you have a little downtime or are wondering what to read to stay on the nose, check out these security articles hand-picked by security experts.
Author: watchTowr Labs
Recommended by: Jeff Walzer (LinkedIn)
Why we like it: Security 101 - basic misconfigurations still persist that put companies at great risk.
Author: Wietz Beukema
Recommended by: Bahvin Patel (LinkedIn)
Why we like it: “Wietze's brilliant project, "ArgFuscator," empowers both red teamers and blue teamers to master the craft of command-line obfuscation for enhanced defense strategies. The primary aim of this initiative is to catalogue and share obfuscation methods used against frequently targeted applications in cyberattacks, enabling users to create their own obfuscated command lines. This is a very neat tool that can help cybersecurity defenders rigorously test and refine their systems, ensuring they can effectively counteract and adapt to obfuscation techniques in real-world scenarios.”
Author: Ravie Lakshmanan
Recommended by: Zachary Christensen (LinkedIn)
Why we like it: “This article provides an interesting look into a hacking collective that exploited known security vulnerabilities to gain initial access. The group utilized a blend of commercially available malware and infrastructure from cybercriminal communities. Their persistent operations underscore organizations' challenges in detecting and mitigating advanced threats. This is another great reminder to remain vigilant with timely patching of known vulnerabilities.”
Author: Elizabeth Montalbano
Recommended by: Mark Stricker (LinkedIn)
Why we like it: “One of the big developments in the last few weeks is the release of the DeepSeek AI Model, which is advanced, open source, and free. But you should always be cautious when something looks too good to be true! This article covers the security concerns around Deepseek and AI models in general. The article provides a good starting point for discussions around cybersecurity as it relates to the LLM models that are being released very frequently these days!”
Author: Manuel Arrieta
Recommended by: Sydney Marrone (LinkedIn)
Why we like it: “PowerShell obfuscation is one of my favorite topics, as it was one of the first techniques I ever dug into as a threat hunter. This article does a solid job of taking our querying to the next level by introducing statistical methods—specifically, standard deviation—to detect suspicious command-line activity. Most detections out there rely on basic string matching, but this approach is next-level and can really help combat the ever-evolving sophistication of attacks. Happy thrunting!”
Author: Lily Newman
Recommended by: Tamara Chacon (@holly1g0lightly)
Why we like it: “Lily Newman of WIRED sits down with outgoing CISA director, Jen Easterly. In the video interview they discuss director Easterly's future, her thoughts and hopes for the future of CISA and cybersecurity in the United States.”
That rounds out this month’s security reading recommendations! Check back next month for your next to-reads. In the meantime, check out these resources for more security content:
Splunk Threat Research Team (STRT)
The world’s leading organizations rely on Splunk, a Cisco company, to continuously strengthen digital resilience with our unified security and observability platform, powered by industry-leading AI.
Our customers trust Splunk’s award-winning security and observability solutions to secure and improve the reliability of their complex digital environments, at any scale.