Tag: Surge

Latest Articles

Detecting Lateral Movement with Splunk: How To Spot the Signs
Security
4 Minute Read

Detecting Lateral Movement with Splunk: How To Spot the Signs

Identifying lateral movement is so important, and it sure isn't easy. Using Splunk makes it a lot easier, and we'll show you how in this tutorial.
Process Hunting with PSTree
Security
5 Minute Read

Process Hunting with PSTree

This tutorial shows how to use the pstree command & app to help you look through all the processes you have to investigate.
Detecting New Domains in Splunk (Finding New Evil)
Security
7 Minute Read

Detecting New Domains in Splunk (Finding New Evil)

Ready to find "new" domains that may be naughty? We'll walk you through how to use Splunk & Splunk Enterprise Security to do that: get the full story here!
Add To Chrome? - Part 4: Threat Hunting in 3-Dimensions: M-ATH in the Chrome Web Store
Security
5 Minute Read

Add To Chrome? - Part 4: Threat Hunting in 3-Dimensions: M-ATH in the Chrome Web Store

SURGe experiments with a method to find masquerading using M-ATH with Splunk and the DSDL App.
Add to Chrome? - Part 3: Findings and Recommendations
Security
5 Minute Read

Add to Chrome? - Part 3: Findings and Recommendations

SURGe explores findings and general recommendations on whether or not you should click 'Add to Chrome' the next time you find a fancy new extension.
Add to Chrome? - Part 2: How We Did Our Research
Security
5 Minute Read

Add to Chrome? - Part 2: How We Did Our Research

SURGe explores the analysis pipeline in more detail and digs into the two main phases of this research – how the team collected the data and how they analyzed it.
Add to Chrome? - Part 1: An Analysis of Chrome Browser Extension Security
Security
4 Minute Read

Add to Chrome? - Part 1: An Analysis of Chrome Browser Extension Security

An overview of SURGe research that analyzed the entire corpus of public browser extensions available on the Google Chrome Web Store.
Hypothesis-Driven Cryptominer Hunting with PEAK
Security
11 Minute Read

Hypothesis-Driven Cryptominer Hunting with PEAK

A sample hypothesis-driven hunt, using SURGe's PEAK threat hunting framework, looking for unauthorized cryptominers.
Old School vs. New School
Security
6 Minute Read

Old School vs. New School

The Splunk SURGe team examines the claim that generative AI will empower threat actors to improve the scale and/or efficiency of their spear-phishing campaigns.
/en_us/blog/fragments/subscribe-footer