false

Tag: SURGe

Latest Articles

Security 4 Min Read

CISA’s Known Exploited Vulnerabilities Catalog and Splunk

Accompanying today’s announcement from CISA (BOD 22-01) and their new Known Exploited Vulnerabilities Catalog, SURGe and Splunk Threat Research Team (STRT) have coordinated to add functionality into Enterprise Security Content Updates (ESCU). This added functionality will help network defenders understand vulnerability context alongside relevant ESCU detections.
Security 4 Min Read

High(er) Fidelity Software Supply Chain Attack Detection

Software supply chain attacks are not going away. As our network defenses improve, adversaries must move up the chain to stay a step ahead of our defenses.
.conf & .conf Go 3 Min Read

SURGe: Blue Collar for the Blue Team

Splunk has a new security research team focused on in-depth analysis of the latest cybersecurity news to help the public navigate security incidents with confidence using Splunk.
Security 2 Min Read

No Regrets Using Autoregress

The autoregression command, which is a centralized streaming command, is used to calculate a moving average. Learn how to use this command to gather information, just in time for Boss of the SOC v6!
Security 6 Min Read

Go With the Flow - Network Telemetry (VPC Data) in AWS

This blog post describes how to use VPC data from AWS in Splunk to hunt hunt hunt!
Security 5 Min Read

CloudTrail - Digital Breadcrumbs for AWS

This blog post reviews AWS cloudtrail as a security logging source and how to hunt in it
Security 4 Min Read

November Spawned an Osquery

This blogs reviews how to hunt through osquery logs
Security 3 Min Read

I Azure You, This Will Be Useful

This blog post describes how to use Azure Active directory for basic hunting and discovery
Security 3 Min Read

The Future is Cloudy with a Chance of Microsoft Office 365

This blog reviews the data that comes out of Office365 and how to use it to hunt in Splunk.