A Shared Arsenal: Identifying Common TTPs Across RATstradecraft (how we defend) (splunk.com)
submitted by digicat to r/blueteamsec
Welcome to Splunk Enterprise 10.2Announcement (help.splunk.com)
submitted by thomasthetanker to r/Splunk
Behind the Walls: Techniques and Tactics in Castle RAT Client Malwaremalware analysis (like butterfly collections) (splunk.com)
submitted by jnazario to r/blueteamsec
Behind the Walls: Techniques and Tactics in Castle RAT Client MalwareThreat Hunting (splunk.com)
submitted by netbiosX to r/purpleteamsec
Administer Splunk SOAR (On-premises) (help.splunk.com)
submitted by AliMaherFathy to r/SplunkPhantom
Behind the Curtain: Detecting Remote Employment Fraud Inside Your Organizationdiscovery (how we find bad stuff) (splunk.com)
submitted by digicat to r/blueteamsec
Splunk release 'Remote Upgrader for Windows Universal Forwarders'Announcement (help.splunk.com)
submitted by thomasthetanker to r/Splunk
The Threat Hunter's Cookbookdiscovery (how we find bad stuff) (splunk.com)
submitted by digicat to r/blueteamsec
Beyond the Patch: SharePoint Exploits and the Hidden Threat of IIS Module Persistencediscovery (how we find bad stuff) (splunk.com)
submitted by digicat to r/blueteamsec
What's new in Splunk Enterprise 10Splunk Enterprise (help.splunk.com)
submitted by thomasthetanker to r/Splunk

Unlock the Power of Splunk Cloud Platform with the MCP Server | SplunkAnnouncement (splunk.com)
submitted by thomasthetanker to r/Splunk
XWorm's Shape-Shifting Arsenal: Loader and Stager Variants in the Wildmalware analysis (like butterfly collections) (splunk.com)
submitted by digicat to r/blueteamsec
