Tran Hoang PhongforFIS Securityblog.fiscybersec.com·20 hours agoCVE-2024-36991 - Lỗ hổng nghiêm trọng trên Splunk có thể bị khai thác để đọc tất cả file trên hệ thốngCác nhà nghiên cứu bảo mật đã đưa ra cảnh báo về một lỗ hổng Splunk Enterprise có thể cho phép kẻ tấn công đọc mọi file trên hệ thống. Lỗ hổng nghiêm trọng hơn so với lúc ban đầu nó xuất hiện và có thể bị khai thác bằng một GET request đơn giản. 1. C...DiscussNewslettersCVE
The Intel Chroniclesintelchronicles.com·Jul 22, 2024Splunk Enterprise Hit by Critical Path Traversal Vulnerability: CVE-2024-36991Executive Summary On 17 July 2024, an arbitrary file read vulnerability in the Splunk Enterprise installations/deployments was identified by the SonicWall Capture Labs cyber threat research team. The vulnerability tracked as CVE-2024-36991. This vuln...Discuss·7 likes·100 readsVulnerability IntelligenceSplunk
Michelle Anyanwumichanya.hashnode.dev·Jul 23, 2024Mastering Splunk: My Journey with Foundational KnowledgeAs a cybersecurity apprentice, diving into Splunk has been an enlightening experience. This powerful tool, which captures, indexes, and correlates real-time data, has become essential in navigating the vast landscape of data management and security m...Discuss·1 likeData Monitoring
Simonsimonlvgn.hashnode.dev·Jun 11, 2024VS Code Extensions for Detection EngineeringIntroduction In this blog post, we'll explore useful Visual Studio Code extensions for detection engineering. These extensions can help you write and validate rules, navigate complex data structures, and even interrogate databases. Let's dive in! Sig...Discussstix
Prakhar tripathiprakhartripathi.hashnode.dev·Jun 1, 2024Log Parsing Tools Compared: Choosing Between Grep, Awk, and SedLog parsing is an essential task in system administration, monitoring, and data analysis. It helps in identifying issues, understanding system behavior, and gaining insights from log files. In this blog, we will explore the popular log parsing comman...Discusslog analysis
Darshilciphersec.hashnode.dev·Feb 29, 2024Chapter 7: Splunk Best Practices 🌐Introduction In this chapter, we delve into a comprehensive guide on industry best practices for harnessing the full potential of Splunk. By adhering to these recommendations, organizations can streamline operations and extract maximum value from the...Discuss 🚀 The Ultimate Guide for Beginners to Pros in Splunk 🕵️♂️ Splunk
Darshilciphersec.hashnode.dev·Feb 29, 2024Chapter 6: Splunk for Cybersecurity 🛡️Introduction In this chapter, we delve into the indispensable role that Splunk plays in fortifying cybersecurity frameworks. By harnessing Splunk's robust capabilities, organizations can effectively combat the evolving landscape of cyber threats. Imp...Discuss 🚀 The Ultimate Guide for Beginners to Pros in Splunk 🕵️♂️ Splunk
Brzozovabelikeneoandtrinity.hashnode.dev·Feb 26, 2024Detect ARP spoofing quickly & increase network securityTo gain insights into the underlying protocols and strengthen defenses against attacks like ARP spoofing, several tools are available that can help us in network monitoring, analysis, and security. Check my list of the best tools to hack or detect AR...Discusssnort
Cloudzenixcloudzenix2024.hashnode.dev·Jan 24, 2024Starting with Splunk: A Comprehensive Guide for BeginnersIntroduction Splunk is a powerful data analytics and visualization tool that allows organizations to gain insights from their machine-generated data. Whether you are a beginner or have some experience with data analysis, this comprehensive guide will...Discuss·1 likeSplunk
Awais Sajidblackdiamond.hashnode.dev·Jan 12, 2024Easy Steps to Connect Fortigate Firewall with Splunk — Part 3In the previous parts of this series, we introduced the foundational steps to integrate your Apache server with Splunk. In this continuation, we delve into the technical specifics, guiding you through the process of setting up your Fortigate Firewall...DiscussSplunk