Security

Security

Stat! 3 Must-Have Data Filtering Techniques

To hunt for threats, there's a lot of data you do NOT need. Here are the 3 must-have data filtering techniques so you can hunt those threats STAT!

Security

Compliance Essentials for Splunk 2.1.0

Announcing the latest on Compliance Essentials for Splunk, an essential part of your toolkit to help your organization maintain and monitor your compliance status and cyber resiliency with various frameworks.

Security

Enhance Security Resilience Through Splunk User Behavior Analytics VPN Models

This blog introduces new machine learning models in Splunk UBA for VPN connection monitoring to enhance WFH security resilience.

Security

More Than Just a RAT: Unveiling NjRAT's MBR Wiping Capabilities

The Splunk Threat Research Team (STRT) provides a deep-dive analysis of NjRAT (or Bladabindi), a Remote Access Trojan (RAT) discovered in 2012 that's still active today.

Security

Detect WS_FTP Server Exploitation with Splunk Attack Range

The Splunk Threat Research Team shares how they used Splunk Attack Range to develop detection content related to CVE-2023-40044.

Security

Staff Picks for Splunk Security Reading October 2023

Splunk security experts share their list of presentations, whitepapers, and customer case studies from October 2023 that they feel are worth a read.

ALL TAGS
Show All Tags
Show Less Tags