Howdy, folks!
A new month, so a new list of security picks! Splunk security nerds (employees and customers) like to make things. They like to make LOTS of things. But sometimes... they get lost! So as we promised in early 2018, we are bringing you some golden security nuggets you might not have seen before. These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read.
For more reading, check out our monthly staff security picks and our all-time best picks for security books and articles! I hope you enjoy.
29.8978876,-97.2158734 |
How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today by Tom Strickx BGP. Whenever I hear those three letters, I am transported back the summer of 2001 when I was studying for my CCNA. Tucked into one of the textbooks was a small mention of "L0pht Crack" and bringing down the internet in "30 minutes" using BGP. In the 20+ years since those "Long haired computer hackers" testified in front of Congress, we have seen various versions of this prophecy come true. From nation-states, intentionally rerouting traffic through their "pipes" to independent organizations pulling a "whoopsies!" This article is excellent for walking through exactly what happened, how, and why. Our |
37.5894543,-108.3288389 |
This month's pick has a couple of concepts I enjoy so the confluence of them was just too good to pass up. I have spent a good chunk of time over the past year working with MITRE ATT&CK and applying it to threat hunting. Moreover, for those of you who have participated in Splunk's Boss of the SOC (BOTS) or have attended James Brodsky's endpoint talks at .conf, you know that we love endpoint monitoring and we have found OSQuery to be quite helpful and useful for endpoint visibility. Based on those two areas of interest, I wanted to call out a talk that Guillaume Ross gave at SANS Security Operations Summit this month. Guillaume walks through the Singapore Health Service breach and maps the report to MITRE ATT&CK and then looks at how you can use OSQuery to detect these ATT&CK techniques such that as these techniques are used further in the same campaign or by others, they can be detected moving forward by the SecOps team. It is critical to understand previous attacks and learn from them, and his use of OSQuery at the endpoint provides a great example of how any organization can do this! |
46.7104589,-116.8866933 |
Project Svalbard: The Future of Have I Been Pwned by Troy Hunt This month I wanted to share a little different type of security read. Have you ever used the site "Have I Been Pwned?" If you are not familiar with it, it is a site that collects compromised email addresses from breaches. Visit the site, enter your email address, and find out if it has been a part of any major breaches in the last couple of years! You can even be proactive and enter your email into a watchlist for notification in future breaches. A single IT professional, Troy Hunt, created/maintains the site, and this article talks about his journey with the site, burnout, and his attempts migrate the site to a company that can maintain. I wanted to give Troy a personal thanks for his commitment to this service, and hopefully, this site ends up in good hands. |
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.