false

Tag: SURGe

Latest Articles

Security 3 Min Read

Parsing Domains with URL Toolbox (Just Like House Slytherin)

One of the most popular Splunk security apps of all time, URL Toolbox’s URL parsing capabilities have been leveraged by thousands. Full story here.
Security 5 Min Read

Using eval to Calculate, Appraise, Classify, Estimate & Threat Hunt

This article discusses a foundational capability within Splunk — the eval command. Need to pick a couple commands for your desert island collection? eval should be one!
Security 4 Min Read

Using RegEx for Threat Hunting (It’s Not Gibberish, We Promise!)

Another excellent tool for your threat hunting: RegEx! SPL offers two commands for utilizing regular expressions in Splunk searches. See how to do it here.
Security 6 Min Read

Stat! 3 Must-Have Data Filtering Techniques

To hunt for threats, there's a lot of data you do NOT need. Here are the 3 must-have data filtering techniques so you can hunt those threats STAT!
Security 5 Min Read

Revisiting the Big Picture: Macro-level ATT&CK Updates for 2023

SURGe reviews the latest attacker trends and behaviors with this look at four years of ATT&CK data from some of the largest and most trusted threat reporting sources.
Security 4 Min Read

Using metadata & tstats for Threat Hunting

Behold the power of metadata and tstats commands! These commands will quickly provide situational awareness of your hosts and sourcetypes as you begin hunting.
Security 6 Min Read

Threat Hunting for Dictionary-DGA with PEAK

Explore applied model-assisted threat hunting for dictionary-based domain generation algorithms using the SURGe Security Research Team's PEAK Threat Hunting Framework.
Security 4 Min Read

Key Threat Hunting Deliverables with PEAK

When most people think of threat hunting, they think of uncovering unknown threats – but that is only one of many (better) reasons to show value with threat hunting.
Learn 5 Min Read

Quantum-Safe Cryptography & Standards: QSC, PQC, QKD & More!

Quantum-safe cryptography sounds complicated. Expert Kirsty Paine defines quantum-safe cryptography, differentiates PQC & QKD, and talks NIST post-quantum process.