Posted
over 2 years
ago
A serious remote code execution (RCE) vulnerability (CVE-2021-44228) in the popular open source Apache Log4j logging library poses a threat to thousands of applications and third-party services that leverage this library. From Splunk SURGe, learn how you can detect Log4j 2 RCE using Splunk.
|
Posted
over 2 years
ago
Splunk is currently reviewing our supported products for impact and evaluating options for remediation and/or or mitigation.Please return to this posting for the most up to date information.
|
Posted
over 2 years
ago
The Splunk Threat Research Team recently updated the Active Directory Lateral Movement analytic story to help security operations center (SOC) analysts detect adversaries executing these techniques within Windows Active Directory (AD) environments.
|
Posted
over 2 years
ago
Splunk is currently reviewing our supported products for impact and evaluating options for remediation and/or or mitigation.Please return to this posting for the most up to date information.
|
Posted
over 2 years
ago
Year Up is a program committed to closing the Opportunity Divide by ensuring equitable access to economic opportunity, education, and justice for all young adults — no matter their background, income, or zip code. Hear from Splunk's Andy Hershey as he discusses Splunk's partnership with the Year Up program.
|
Posted
over 2 years
ago
Get the latest on new integrations from Splunk, Microsoft and GitHub in this roundup on the latest updates.
|
Posted
over 2 years
ago
A serious remote code execution (RCE) vulnerability (CVE-2021-44228) in the popular open source Apache Log4j logging library poses a threat to thousands of applications and third-party services that leverage this library. From Splunk SURGe, learn how you can detect Log4j 2 RCE using Splunk.
|
Posted
over 2 years
ago
Splunk for iPad is available to all Splunk Cloud Platform or Splunk Enterprise customers TODAY in the iOS app store. Make better, faster decisions and make it simple for anyone to access, explore, and understand Splunk data on-the-go.
|
Posted
over 2 years
ago
In this Hunting with Splunk episode (part 2 or 2), we focus on, you guessed it, pipes. Pipes are a form of inter-process communication (IPC), which can be used for abuse just like processes can.
|
Posted
over 2 years
ago
Splunk is proud to partner with the Rural Technology Fund (RTF) Golden Ticket fundraiser to support technology-related education and scholarships.
|