Tune into the Tech Talk to learn how to onboard and search for Threat Indicators in your Splunk environment to start detecting SolarWinds related malware, start detecting Sunburst malware activity using Splunk by reviewing and updating your log types ingested into Splunk, then examine DNS, network, and host traffic logs, and start detecting Supernova webshell malware by examining results of vulnerability scans, hashes and proxy logs. See more follow up resources and sign up for live webinars on our community discussion site at www.splunk.com/techtalk
![](https://i.ytimg.com/vi/gu5yrJhnxhg/maxresdefault.jpg)