sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

579
active users

#splunk

0 posts0 participants0 posts today

Since DNS is on 🔥 today I should note if you're a Splunk shop, the DNS data model in Enterprise Security does not include the field for TXT record values, you need to add that manually.

Then you can do high-fidelity detections such as length and base64 with conversions looking for code.

Google DocsSplunk Risk Based Alerting Hands-On Workshop (Virtual)Join us on January 16th, 1:00PM - 5:00PM EST for a virtual RBA Hands-On Workshop. Summary: This workshop is led by SEs, Security SMEs, CSMs, and Specialists with advanced cybersecurity knowledge and is designed to give participants hands-on experience with RBA. The lessons learned in this workshop will provide participants with the ability to begin deploying RBA with Enterprise Security. Initial goals include optimizing functions in the SOC such as detection engineering, triage, and investigations which ultimately free up cycles to focus on proactive activities such as adversary simulation, threat intelligence, SOAR, and threat hunting. Prerequisite: The Enterprise Security with Risk-Based Alerting Overview and Demo are a required prerequisite for this workshop. This overview is led by SEs, Security SMEs, CSMs, and Specialists and is designed to provide any persona in the SOC with both an understanding of the RBA concept as well as help participants visualize the RBA endgame via a compelling and relevant demo. The workshop agenda is approximately 4 hours and includes: • High level overview • Assets & Identities – Exercise • MITRE ATT&CK Breakdown – Exercise • Risk Rule – Exercise • Risk Incident Rule – Exercise • RBA and Beyond: Art of the Possible Who Should Attend? The workshop is designed for personas on a Security Operations team that are responsible for content creation, usually the Detection Engineering team. What You Need: This workshop is hands-on, and each user will need access to a modern web browser with internet connectivity. Splunk will provide a cloud environment where the Splunk software and data will reside. Once registered, you will be sent a calendar invite for the event. If you have any questions about this workshop, please contact bfelicioni@splunk.com
#splunk#rba#infosec

Hey fellow #OpenSearch fans. I'm curious if there's a way to do #Splunk syntax type searches? I came to OpenSearch from solr, graylog, and ELK, so I'm generally content with Lucene syntax, but overcoming the muscle memory has been more challenging from some coworkers that are used to Splunk. I would love to see OpenSearch become more of the goto over Splunk and this capability would go a long way to making that happen.

We’re thrilled to announce that the Investigative Journalism Foundation has been selected as a #Splunk Social Impact grantee helping to bridge the Data Divide!

This opportunity allows us to further our mission of holding power to account by leveraging data for transformative change. Learn more about our journey and other inspiring nonprofits here:

splunk.com/en_us/blog/splunk-f

👋 Hello Mastodon!

I'm Steven Butterworth, aka UKITGURU. I specialise in InfoSec and SIEM technologies (Splunk, Sentinel, Elastic). As a freelancer, I create and deliver SIEM content, working with gov departments and private sectors. Passionate about Data Science, Data Engineering, and data literacy. Avid triathlon enthusiast—never enough bikes! 🚴‍♂️

Looking forward to connecting!

#InfoSec
#SIEM
#Splunk
#Sentinel
#DataScience
#Triathlon
#Cycling

Podatność Path traversal w Splunk Enterprise na Windows

W oprogramowaniu Splunk Enterprise działającym na systemach Windows ujawniona została niedawno podatność typu path traversal, pozwalająca atakującemu na nieuprawniony dostęp do plików na podatnym systemie. Błąd może wykorzystać zdalnie nieuwierzytelniony atakujący i sprowadza się do wysłania pojedynczego żądania HTTP GET. Do wykorzystania może dojść w ścieżce /modules/messaging/ na instancjach Splunk z włączonym modułem...

#WBiegu #Cve #PathTraversal #Podatność #Python #Splunk #Websecurity

sekurak.pl/podatnosc-path-trav

Sekurak · Podatność Path traversal w Splunk Enterprise na WindowsW oprogramowaniu Splunk Enterprise działającym na systemach Windows ujawniona została niedawno podatność typu path traversal, pozwalająca atakującemu na nieuprawniony dostęp do plików na podatnym systemie. Błąd może wykorzystać zdalnie nieuwierzytelniony atakujący i sprowadza się do wysłania pojedynczego żądania HTTP GET. Do wykorzystania może dojść w ścieżce /modules/messaging/ na instancjach Splunk z włączonym modułem...