Creating Macros for Code Reuse in Splunk
When you find yourself constantly reusing certain strings of Splunk commands, it can be a lot easier to represent those…
When you find yourself constantly reusing certain strings of Splunk commands, it can be a lot easier to represent those…
Sometimes when working with new log sources or unfamiliar event records being shipped to Splunk, you’ll encounter logs with important…
Elastic has many “Field Types”. Flattened is a type that allows you to search subfields. Typically for cyber security analysts…
1) Add to transforms.conf stanza: batch_index_query = 0 case_sensitive_match = 0 filename = field_from_sourcetype.csv match_type = WILDCARD(Sourcetype) JOIN FOR FREE…
Often, especially when providing context to analysts who are responsible for triaging alerts, it is useful to provide all of…
Emerging last year as the successor to Royal ransomware, BlackSuit has quickly evolved into a highly sophisticated malicious spinoff, aggressively…
Following a wave of cyber attacks by the Iran-linked hacking collective tracked as Pioneer Kitten, the FBI, CISA, and authoring…
A new Rust-based stealer malware dubbed Fickle Stealer has come to the scene, capable of extracting sensitive data from compromised…
Hot on the heels of the recent wave of cyber-attacks leveraging a highly evasive Strela Stealer in Central and Southwestern…
Cybersecurity researchers have identified an ongoing in-the-wild adversary campaign, which leverages a known RCE vulnerability in Microsoft Office tracked as…