• Skip to primary navigation
  • Skip to content
  • Skip to footer
Security Content Security Content
  • Detections
  • Analytic Stories
  • Playbooks
  • Blog
  • About
    • Types
      • Endpoint
      • Application
      • Cloud
      • Network
      • Web
      • Experimental
      • Deprecated
    • Tactic
      • Collection
      • Command And Control
      • Credential Access
      • Defense Evasion
      • Discovery
      • Execution
      • Exfiltration
      • Impact
      • Initial Access
      • Lateral Movement
      • Persistence
      • Privilege Escalation
      • Reconnaissance
      • Resource Development
    • Datamodel
      • Authentication
      • Change
      • Change_Analysis
      • Email
      • Endpoint
      • Network_Resolution
      • Network_Sessions
      • Network_Traffic
      • Risk
      • Splunk_Audit
      • UEBA
      • Updates
      • Vulnerabilities
      • Web
    • Product
      • Splunk Enterprise Security
      • Splunk Behavioral Analytics

    Email

    Email Attachments With Lots Of Spaces

    Suspicious Email Attachment Extensions

    Spearphishing Attachment, Phishing

    GCP Detect high risk permissions by resource and account

    Valid Accounts

    GCP Detect accounts with high risk roles by project

    Valid Accounts

    GCP Detect gcploit framework

    Valid Accounts

    Detect New Open GCP Storage Buckets

    Data from Cloud Storage

    Suspicious Email - UBA Anomaly

    Phishing

    GCP Kubernetes cluster scan detection

    Cloud Service Discovery

    Monitor Email For Brand Abuse

    • Twitter
    • GitHub
    • Feed
    © 2024 Splunk Threat Research Team (STRT). Powered by Jekyll & Minimal Mistakes.