Splunk Threat Research Team's Blog Posts

The Splunk Threat Research Team is an active part of a customer’s overall defense strategy by enhancing Splunk security offerings with verified research and security content such as use cases, detection searches, and playbooks. We help security teams around the globe strengthen operations by providing tactical guidance and insights to detect, investigate and respond against the latest threats. The Splunk Threat Research Team focuses on understanding how threats, actors, and vulnerabilities work, and the team replicates attacks which are stored as datasets in the Attack Data repository.

Our goal is to provide security teams with research they can leverage in their day to day operations and to become the industry standard for SIEM detections. We are a team of industry-recognized experts who are encouraged to improve the security industry by sharing our work with the community via conference talks, open-sourcing projects, and writing white papers or blogs. You will also find us presenting our research at conferences such as Defcon, Blackhat, RSA, and many more.

Read more Splunk Security Content.

Introducing Splunk Attack Range v4.0
Security
3 Minute Read

Introducing Splunk Attack Range v4.0

Splunk Attack Range v4.0 empowers security teams to build detections & emulate adversaries.
Splunk Security Content for Threat Detection & Response: May Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: May Recap

There are 13 new analytics and 4 new analytic stories now available in Splunk Enterprise Security via the ESCU application update process.
Securing the Network Edge: Cisco Secure Firewall Threat Defense Detections for Splunk
Security
14 Minute Read

Securing the Network Edge: Cisco Secure Firewall Threat Defense Detections for Splunk

Enhance your network security with Cisco Firepower Threat Defense and Splunk using out-of-the-box detections developed by Splunk's Threat Research Team.
Breaking Down Termite Ransomware: Infection Methods and Detections
Security
8 Minute Read

Breaking Down Termite Ransomware: Infection Methods and Detections

Deep dive into Termite ransomware: Discover its infection methods, targeted vulnerabilities (like Cleo's CVE-2024-50623), and Splunk security detections.
Cloak and Firewall: Exposing Netsh’s Hidden Command Tricks
Security
10 Minute Read

Cloak and Firewall: Exposing Netsh’s Hidden Command Tricks

Learn about hidden Netsh command tricks, detection methods, and Splunk security detections to protect your Windows systems.
Sinister SQL Queries and How to Catch Them
Security
16 Minute Read

Sinister SQL Queries and How to Catch Them

Discover comprehensive strategies for detecting and mitigating SQL Server attacks.