Making Use of Building Block Rules in Elastic Threats Within the “Advanced Options” of the “About Rule” section of… rooter November 27, 2024 1 min read 0
Fields Aren’t Always Faster, Keyword Searches to Speed Up Splunk Threats When possible, use datamodels, they are generally your best bet… rooter November 27, 2024 1 min read 0
Making Use of Fillnull and Values() to Increase Rule Resiliency in Splunk Threats Within splunk we use “stats” and “tstats” a bunch as… rooter November 27, 2024 2 min read 0
Creating Macros for Code Reuse in Splunk Threats When you find yourself constantly reusing certain strings of Splunk… rooter November 27, 2024 2 min read 0
Extracting fields in SPL Threats Sometimes when working with new log sources or unfamiliar event… rooter November 25, 2024 2 min read 0
Elastic Flattened Fields Explained Threats Elastic has many “Field Types”. Flattened is a type that… rooter November 25, 2024 1 min read 0
Splunk: How to Make Lookup Based on Wildcards Threats 1) Add to transforms.conf stanza: [field_from_sourcetype] batch_index_query = 0 case_sensitive_match… rooter November 25, 2024 1 min read 0
Splunk: How to Output Nested json as One Field Threats Often, especially when providing context to analysts who are responsible… rooter November 25, 2024 1 min read 0
BlackSuit Ransomware Detection: Ignoble Scorpius Escalates Attacks, Targets 90+ Organizations Worldwide Threats Emerging last year as the successor to Royal ransomware, BlackSuit… rooter November 25, 2024 4 min read 0
BianLian Ransomware Detection: AA23-136A Joint Cybersecurity Advisory Details on TTPs Leveraged by BianLian Operators in the Ongoing Malicious Campaigns Threats Following a wave of cyber attacks by the Iran-linked hacking… rooter November 22, 2024 5 min read 0