Welcome to the new Splunkbase! To return to the old Splunkbase, click here.
Cyber Security Essentials app icon

Cyber Security Essentials

Hunt APT, state threat actors, their malware tools & exploits, by searching Splunk event logs It is a must-have app, which hunts for presence of advanced persistent threats (APTs), threat actors, state-sponsored attackers, malware, and exploits in your organization's assets. All detected malware, exploits, and threat actors are mapped to the MITRE ATT&CK framework, providing deep insight into potential risks. Cyber Security Essentials identifies a wide range of malware tools used by threat actors, including: 1. Backdoor. 2. Worms. 3. Ransomware. 4. Bots. 5. Trojan horses. 6. Keyloggers. 7. Rootkits. 8. Spyware. 9. Fileless malware. 10. Cryptojacking. 11. Wiper malware. 12. Adware. 14. Viruses 15. P2P-Worm 16. Internet Worms 17. Net-worm 18. Clickjacking 19. Cryptominer 20. Fileless malware You can easily configure the scan interval in the app’s settings. The real-time scan feature continuously monitors for threats in near real-time, as allowed by Splunk. Information Use: Your email address is used to improve detection logic based on your feedback. Additionally, we may notify you about app upgrades, updates, or changes to features, user agreements, or the privacy policy.

splunk product badge

Latest Version 1.1.29
June 15, 2025
Compatibility
Not Available
Platform Version: 9.4, 9.3, 9.2, 9.1, 9.0, 8.2, 8.1, 8.0, 7.3, 7.2, 7.1, 7.0
CIM Version: 6.x, 5.x, 4.x, 3.x
Rating

0

(0)

Log in to rate this app
Support
Cyber Security Essentials support icon
Developer Supported app
Ranking

#18

in Threat Intel
Hunt APT, state threat actors, their malware tools & exploits, by searching Splunk event logs It is a must-have app, which hunts for presence of advanced persistent threats (APTs), threat actors, state-sponsored attackers, malware, and exploits in your organization's assets. All detected malware, exploits, and threat actors are mapped to the MITRE ATT&CK framework, providing deep insight into potential risks. Cyber Security Essentials identifies a wide range of malware tools used by threat actors, including: 1. Backdoor. 2. Worms. 3. Ransomware. 4. Bots. 5. Trojan horses. 6. Keyloggers. 7. Rootkits. 8. Spyware. 9. Fileless malware. 10. Cryptojacking. 11. Wiper malware. 12. Adware. 14. Viruses 15. P2P-Worm 16. Internet Worms 17. Net-worm 18. Clickjacking 19. Cryptominer 20. Fileless malware You can easily configure the scan interval in the app’s settings. The real-time scan feature continuously monitors for threats in near real-time, as allowed by Splunk. Information Use: Your email address is used to improve detection logic based on your feedback. Additionally, we may notify you about app upgrades, updates, or changes to features, user agreements, or the privacy policy.

Categories

Created By

Cyber Essentials Avertpoint

Type

app

Downloads

1,639

Resources

Login to report this app listing