9
I Use This!
Activity Not Available

News

Posted over 2 years ago
A serious remote code execution (RCE) vulnerability (CVE-2021-44228) in the popular open source Apache Log4j logging library poses a threat to thousands of applications and third-party services that leverage this library. From Splunk SURGe, learn how you can detect Log4j 2 RCE using Splunk.
Posted over 2 years ago
Splunk is currently reviewing our supported products for impact and evaluating options for remediation and/or or mitigation.Please return to this posting for the most up to date information.
Posted over 2 years ago
The Splunk Threat Research Team recently updated the Active Directory Lateral Movement analytic story to help security operations center (SOC) analysts detect adversaries executing these techniques within Windows Active Directory (AD) environments.
Posted over 2 years ago
Splunk is currently reviewing our supported products for impact and evaluating options for remediation and/or or mitigation.Please return to this posting for the most up to date information.
Posted over 2 years ago
Year Up is a program committed to closing the Opportunity Divide by ensuring equitable access to economic opportunity, education, and justice for all young adults — no matter their background, income, or zip code. Hear from Splunk's Andy Hershey as he discusses Splunk's partnership with the Year Up program.
Posted over 2 years ago
Get the latest on new integrations from Splunk, Microsoft and GitHub in this roundup on the latest updates.
Posted over 2 years ago
A serious remote code execution (RCE) vulnerability (CVE-2021-44228) in the popular open source Apache Log4j logging library poses a threat to thousands of applications and third-party services that leverage this library. From Splunk SURGe, learn how you can detect Log4j 2 RCE using Splunk.
Posted over 2 years ago
Splunk for iPad is available to all Splunk Cloud Platform or Splunk Enterprise customers TODAY in the iOS app store. Make better, faster decisions and make it simple for anyone to access, explore, and understand Splunk data on-the-go.
Posted over 2 years ago
In this Hunting with Splunk episode (part 2 or 2), we focus on, you guessed it, pipes. Pipes are a form of inter-process communication (IPC), which can be used for abuse just like processes can.
Posted over 2 years ago
Splunk is proud to partner with the Rural Technology Fund (RTF) Golden Ticket fundraiser to support technology-related education and scholarships.