Research

Publications

Talks & Appearances

Splunk Blog Work

Introducing… The Threat Hunter’s Cookbook! image

Introducing… The Threat Hunter’s Cookbook!

Aug 6, 2025 · Splunk Blog

The security experts on the SURGe team have released The Threat Hunter’s Cookbook, a hands-on guide for security practitioners that features actionable insights into threat hunting methods, ready-to-use queries, and more.

Macro ATT&CK for a TTP Snack image

Macro ATT&CK for a TTP Snack

Oct 21, 2024 · Splunk Blog

Splunk's Mick Baccio and Ryan Fetterman explore 2024's macro-level cyber incident trends through the lens of the MITRE ATT&CK framework.

Macro-ATT&CK 2024: A Five-Year Perspective image

Macro-ATT&CK 2024: A Five-Year Perspective

Oct 10, 2024 · Splunk Blog

Splunk’s Ryan Fetterman and Tamara Chacon dive into attacker techniques, trends, and blue team tips for analyzing and visualizing data from the past year.

Threat Hunting for Dictionary-DGA with PEAK image

Threat Hunting for Dictionary-DGA with PEAK

Sep 12, 2023 · Splunk Blog

Explore applied model-assisted threat hunting for dictionary-based domain generation algorithms using the SURGe Security Research Team's PEAK Threat Hunting Framework.

Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework image

Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework

May 17, 2023 · Splunk Blog

Welcome to the third entry in our introduction to the PEAK Threat Hunting Framework! Taking our detective theme to the next level, imagine a tough case where you need to call in a specialized investigator. For these unique cases, we can use algorithmically-driven approaches called Model-Assisted Threat Hunting (M-ATH).