Current space

Members

Filtered creator directory for "Splunk Threat Research Team".

Directory 201.5K Indexed posts 43M Verified 0
Active AuthorsRecent indexed creators Registered MembersAccount directory Completed ProfilesProfiles with public details VerifiedTrusted member signals
201.5KActive members
43MIndexed posts
286KDetailed profiles
6Sources in this view

Active authors

Showing directory results matching your search with real activity counts for visible profiles.

Page 1 | 6 shown
M
Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors | Splunk
Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors | Splunk
Mauricio Velazco, Splunk Threat Research Team avatar
@Mauricio Velazco, Splunk Threat Research Team
Mauricio Velazco,
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors | Splunk
splunk.com
0Following 0Comments 0Views 0Shares
M
Security Insights: Tracking Confluence CVE-2023-22527 | Splunk
Beyond The Click: Unveiling Fake CAPTCHA Campaigns | Splunk
Security Insights: Tracking Confluence CVE-2023-22527 | Splunk
Michael Haag, Splunk Threat Research Team avatar
@Michael Haag, Splunk Threat Research Team
Michael Haag,
Mar 25, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Security Insights: Tracking Confluence CVE-2023-22527 | Splunk
splunk.com
0Following 0Comments 0Views 0Shares
S
Investigating GSuite Phishing Attacks with Splunk | Splunk
From Water to Wine: An Analysis of WINELOADER | Splunk
Cloud Federated Credential Abuse & Cobalt Strike: Threat Research February 2021 | Splunk
Investigating GSuite Phishing Attacks with Splunk | Splunk
Splunk Threat Research Team avatar
@Splunk Threat Research Team
Splunk Threat
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 13Posts 1Sources 0Reputation
Latest signal 0 reactions
Investigating GSuite Phishing Attacks with Splunk | Splunk
splunk.com
0Following 0Comments 0Views 0Shares
S
Splunking Isovalent Data: Initial Setup and Overview | Splunk
Splunking Isovalent Data: Initial Setup and Overview | Splunk
Splunk Threat Research Team, Bhavin Patel avatar
@Splunk Threat Research Team, Bhavin Patel
Splunk Threat
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Splunking Isovalent Data: Initial Setup and Overview | Splunk
splunk.com
0Following 0Comments 0Views 0Shares
S
Defending Against npm Supply Chain Attacks: A Practical Guide to Detection, Emulation, and Analysis | Splunk
Defending Against npm Supply Chain Attacks: A Practical Guide to Detection, Emulation, and...
Splunk Threat Research Team, Michael Haag avatar
@Splunk Threat Research Team, Michael Haag
Splunk Threat
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Defending Against npm Supply Chain Attacks: A Practical Guide to Detection, Emulation, and Analysis | Splunk
splunk.com
0Following 0Comments 0Views 0Shares
S
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware | Splunk
TOTAL-REPLAY: The Bridge to Replay Attacks Using the Security Content Metadata | Splunk
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware | Splunk
Splunk Threat Research Team, Teoderick Contreras avatar
@Splunk Threat Research Team, Teoderick Contreras
Splunk Threat
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware | Splunk
splunk.com
0Following 0Comments 0Views 0Shares