Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Use Cases for the SOC: How Generative AI Transforms Security Operations

Today’s security operations centers (SOCs) are under more pressure than ever. The number of alerts is growing. Threats are more complex. And security teams are expected to detect, investigate, and respond to incidents faster, all while grappling with talent shortages and limited resources. Generative AI is emerging as a critical enabler in this environment.

Inside Today's Cyber Attacks: What We Can Learn from Ransomware Groups Like Scattered Spider

Cyber attackers like Scattered Spider are bypassing firewalls—using stolen credentials and social engineering to walk right in! Learn how these new threats exploit trust, target your help desk, and turn your processes against you. Discover why identity is now the new perimeter and what IT leaders must do to protect their organisations.

Codify to Fortify: The Strategic Advantage of Detection as Code

As a security executive, how do you know if your organization can detect a certain attack? A talented, experienced team armed with advanced tooling can certainly generate confidence — but even then, detections can slip through the cracks if not properly codified.

Introducing Splunk 10: Empowering a Secure and Compliant Future

Splunk is pleased to announce the general availability of Splunk Enterprise 10.0 and Splunk Cloud Platform 10.0, the most secure, stable, and modernized platform for a digitally resilient, compliance-ready future. The Splunk 10 platform is the next evolution of data security. With the latest cryptographic models and more performant data pipeline management, Splunk 10 delivers continued momentum in search & indexing, dashboard visualization, and ease of compliance administration.

Cisco Network Visibility Module Analytics (NVM)

Cisco Network Visibility Module Analytics (NVM): A new analytic story leveraging Cisco NVM telemetry to detect suspicious endpoint network behavior. This release includes 14 new analytics and mapped existing detections covering threats such as insecure curl usage, typosquatted Python packages, abuse of native Windows tools like rundll32 and mshta, and anomalous network connections from uncommon or argument-less processes.

Beyond the Patch: SharePoint Exploits and the Hidden Threat of IIS Module Persistence

The cybersecurity landscape witnessed a perfect storm in July 2025 when multiple critical SharePoint vulnerabilities collided with sophisticated IIS module-based persistence techniques, creating a nightmare scenario for enterprise defenders. CVE-2025-53770, CVE-2025-53771, CVE-2025-49704, and CVE-2025-49706 are being actively exploited by sophisticated threat actors, but the real danger extends far beyond the initial exploitation phase.

CitrixBleed 2: When Memory Leaks Become Session Hijacks

The cybersecurity community is facing yet another critical infrastructure vulnerability that threatens enterprise networks worldwide. CVE-2025-5777, dubbed "CitrixBleed 2" by security researcher Kevin Beaumont, represents a dangerous out-of-bounds memory read vulnerability in Citrix NetScaler ADC and Gateway devices. This new flaw bears an unsettling resemblance to the original CitrixBleed (CVE-2023-4966), which was widely exploited by ransomware groups and nation-state actors in 2023.

Beyond The Click: Unveiling Fake CAPTCHA Campaigns

Social engineering attacks continue to be among the most effective methods for delivering malware and compromising systems. Among these, a concerning trend has emerged and rapidly gained traction: "ClickFix" and "FakeCAPTCHA" campaigns. These sophisticated attacks exploit users' familiarity with everyday verification systems while leveraging clipboard manipulation techniques to deliver malicious payloads—all without exploiting a single technical vulnerability.

Unified Threat Management (UTM): The Complete Guide to Modern Cybersecurity Solutions

Key takeaways Cyber threats today are anything but simple. With attackers using every trick in the book — and inventing new ones all the time — businesses need more than a one-size-fits-all approach to cybersecurity. You require diverse cybersecurity solutions to face a variety of threat vectors. These threats are diverse, evolving, and target multiple layers of your IT environment.

Understanding Attack Surfaces: What They Are and Why They Matter

In today’s digital environments, where cloud infrastructure, remote work, and third-party tools are the norm, the number of ways attackers can reach your systems are infinite. These potential entry points make up your attack surface. Understanding it is the first step toward defending it. As companies adopt more cloud services, mobile endpoints, and third-party apps, attack surfaces continue to grow — making visibility and management more critical than ever.

XWorm's Shape-Shifting Arsenal: Loader and Stager Variants in the Wild

XWorm, a popular and actively distributed remote access trojan (RAT), has steadily evolved into a versatile tool in the cybercriminal toolkit. Known for its robust feature set, ranging from keylogging and remote desktop access to data exfiltration and command execution, XWorm continues to attract threat actors due to its ease of use, modularity, and frequent updates by its developers.

When Installers Turn Evil: The Pascal Script Behind Inno Setup Malware Campaign

Software installer packages are a cornerstone of user-friendly software distribution. Tools like Inno Setup, NSIS (Nullsoft Scriptable Install System), and InstallShield help developers bundle their applications into a single, streamlined installer that users can run with just a few clicks. These installers often include everything needed to set up a program, files, configurations, and even system dependencies, making software installation seamless and accessible.

Threat Hunting with TLS/SSL Certificates

In this article, we’ll analyze how threat actors exploit TLS to hide their operations and how defenders can use exposed certificate metadata to detect them. We will discuss: Let’s get started! (This article is part of our Threat Hunting with Splunk series. We’ve updated it recently to maximize your value.)

Machine Learning in Splunk Enterprise Security: Unleashing Hidden Detection Power

Many Splunk Enterprise Security users are benefiting from machine learning (ML) without even realizing it. Splunk Enterprise Security quietly uses ML-driven anomaly detection to spot unusual patterns or outliers in your security data that static rules or thresholds might miss.