Detecting defense evasion techniques with Wazuh

Detecting defense evasion techniques with Wazuh

Post icon
/ Engineering
By

Defense evasion techniques are methods that threat actors use to conceal their presence, bypass security mechanisms, and operate undetected on compromised systems. By evading detection, adversaries can maintain persistence and continue malicious activity even during active monitoring or security scans. Common defense evasion methods include disabling or uninstalling security tools, tampering with event logs, obfuscating […]

Read more
Post icon
/ Engineering

Detecting defense evasion techniques with Wazuh

By

Defense evasion techniques are methods that threat actors use to conceal their presence, bypass security mechanisms, and operate undetected on compromised systems. By evading detection, adversaries can maintain persistence and continue malicious activity even during active monitoring or security scans. Common defense evasion methods include disabling or uninstalling security tools, tampering with event logs, obfuscating […]

Read more
Wazuh and NETCB Partner to Advance Cybersecurity Across Southern Africa

Wazuh and NETCB Partner to Advance Cybersecurity Across Southern Africa

Post icon
/ News
By

San Jose, California, August 2025 – Wazuh, the leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, announced a strategic partnership with NETCB, an ICT solutions provider specializing in cybersecurity, compliance, and digital infrastructure. NETCB will leverage Wazuh for security event monitoring and the development of security […]

Read more
Post icon
/ News

Wazuh and NETCB Partner to Advance Cybersecurity Across Southern Africa

By

San Jose, California, August 2025 – Wazuh, the leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, announced a strategic partnership with NETCB, an ICT solutions provider specializing in cybersecurity, compliance, and digital infrastructure. NETCB will leverage Wazuh for security event monitoring and the development of security […]

Read more
Integrating ServiceNow with Wazuh

Integrating ServiceNow with Wazuh

Post icon
/ Engineering
By

ServiceNow is a cloud-based platform for IT Service Management (ITSM) that helps organizations manage digital workflows for enterprise operations. It provides a centralized system for handling incidents, changes, and requests, enabling process automation, visibility across departments, and structured response procedures. Integrating ServiceNow with Wazuh combines Wazuh threat detection and response capabilities with ServiceNow incident management. […]

Read more
Post icon
/ Engineering

Integrating ServiceNow with Wazuh

By

ServiceNow is a cloud-based platform for IT Service Management (ITSM) that helps organizations manage digital workflows for enterprise operations. It provides a centralized system for handling incidents, changes, and requests, enabling process automation, visibility across departments, and structured response procedures. Integrating ServiceNow with Wazuh combines Wazuh threat detection and response capabilities with ServiceNow incident management. […]

Read more
Measuring Wazuh performance and operational efficiency

Measuring Wazuh performance and operational efficiency

Post icon
/ Engineering
By

Measuring performance and operational efficiency of your XDR/SIEM ensures that it runs reliably, scales effectively, and delivers timely security insights. Monitoring metrics like resource usage, connection times, and log processing helps identify bottlenecks, optimize configurations, and prevent downtime. It also ensures that threat detection and intelligence coverage remain consistent, even under high workloads. The Wazuh […]

Read more
Post icon
/ Engineering

Measuring Wazuh performance and operational efficiency

By

Measuring performance and operational efficiency of your XDR/SIEM ensures that it runs reliably, scales effectively, and delivers timely security insights. Monitoring metrics like resource usage, connection times, and log processing helps identify bottlenecks, optimize configurations, and prevent downtime. It also ensures that threat detection and intelligence coverage remain consistent, even under high workloads. The Wazuh […]

Read more
Detecting LodaRAT malware with Wazuh

Detecting LodaRAT malware with Wazuh

Post icon
/ Engineering
By

LodaRAT is a remote access trojan (RAT) known for stealing sensitive data, executing commands, and maintaining persistence on infected systems. Commonly spread via phishing and malicious documents, it now uses advanced tactics like process injection, encrypted C2, and data exfiltration through legitimate services. Recently, a new variant of LodaRAT emerged that can steal saved passwords […]

Read more
Post icon
/ Engineering

Detecting LodaRAT malware with Wazuh

By

LodaRAT is a remote access trojan (RAT) known for stealing sensitive data, executing commands, and maintaining persistence on infected systems. Commonly spread via phishing and malicious documents, it now uses advanced tactics like process injection, encrypted C2, and data exfiltration through legitimate services. Recently, a new variant of LodaRAT emerged that can steal saved passwords […]

Read more
Monitoring MariaDB server with Wazuh

Monitoring MariaDB server with Wazuh

Post icon
/ Engineering
By

MariaDB is an open source database system that stores and manages structured data. It is often chosen for its reliability, speed, and compatibility with MySQL. Many websites, applications, and services use MariaDB to handle data securely and efficiently. Monitoring MariaDB provides real-time visibility into database activities, helping to detect suspicious behavior, prevent unauthorized access, and […]

Read more
Post icon
/ Engineering

Monitoring MariaDB server with Wazuh

By

MariaDB is an open source database system that stores and manages structured data. It is often chosen for its reliability, speed, and compatibility with MySQL. Many websites, applications, and services use MariaDB to handle data securely and efficiently. Monitoring MariaDB provides real-time visibility into database activities, helping to detect suspicious behavior, prevent unauthorized access, and […]

Read more
Wazuh and TW Infosec Partner to Deliver Scalable and Transparent Cybersecurity Solutions

Wazuh and TW Infosec Partner to Deliver Scalable and Transparent Cybersecurity Solutions

Post icon
/ News
By

San Jose, California, July 2025 – Wazuh, the leading provider of open source Extended Detection and Response (XDR) and Security Information and Event Management (SIEM) solutions, announces its partnership with TW Infosec, a cybersecurity firm with a strong presence across Asia, the Middle East, and beyond. Since 2010, TW Infosec has specialized in delivering precise […]

Read more
Post icon
/ News

Wazuh and TW Infosec Partner to Deliver Scalable and Transparent Cybersecurity Solutions

By

San Jose, California, July 2025 – Wazuh, the leading provider of open source Extended Detection and Response (XDR) and Security Information and Event Management (SIEM) solutions, announces its partnership with TW Infosec, a cybersecurity firm with a strong presence across Asia, the Middle East, and beyond. Since 2010, TW Infosec has specialized in delivering precise […]

Read more
Integrating Dependency-Track with  Wazuh

Integrating Dependency-Track with  Wazuh

Post icon
/ Engineering
By

Dependency-Track is an open source platform that helps organizations identify and mitigate risks in their software supply chain. It achieves this by analyzing Software Bill of Materials (SBOMs), which is a detailed inventory of all software components, libraries, and modules that comprise an application. Dependency-Track can be integrated into CI/CD pipelines to analyze SBOMs generated […]

Read more
Post icon
/ Engineering

Integrating Dependency-Track with  Wazuh

By

Dependency-Track is an open source platform that helps organizations identify and mitigate risks in their software supply chain. It achieves this by analyzing Software Bill of Materials (SBOMs), which is a detailed inventory of all software components, libraries, and modules that comprise an application. Dependency-Track can be integrated into CI/CD pipelines to analyze SBOMs generated […]

Read more
Detecting Auto-color malware with Wazuh

Detecting Auto-color malware with Wazuh

Post icon
/ Engineering
By

Auto-color is a stealthy Linux backdoor used in cyberattacks targeting government institutions and universities across North America and Asia. Attributed to an unknown threat actor, Auto-color is specifically designed for persistence and evasion, allowing it to remain undetected on infected systems for extended periods. The malware disguises itself as a harmless color-enhancement utility to avoid […]

Read more
Post icon
/ Engineering

Detecting Auto-color malware with Wazuh

By

Auto-color is a stealthy Linux backdoor used in cyberattacks targeting government institutions and universities across North America and Asia. Attributed to an unknown threat actor, Auto-color is specifically designed for persistence and evasion, allowing it to remain undetected on infected systems for extended periods. The malware disguises itself as a harmless color-enhancement utility to avoid […]

Read more
Wazuh ruleset as code (RaC)

Wazuh ruleset as code (RaC)

Post icon
/ Engineering
By

Wazuh ruleset as code (RaC) introduces a DevOps-driven approach to consistently manage Wazuh threat detection and security monitoring rulesets. It allows security teams to use version control systems and CI/CD pipelines to automatically deploy Wazuh rules and decoders. This approach leverages the principles of infrastructure as code (IaC) to enable collaboration, change tracking, and rollback […]

Read more
Post icon
/ Engineering

Wazuh ruleset as code (RaC)

By

Wazuh ruleset as code (RaC) introduces a DevOps-driven approach to consistently manage Wazuh threat detection and security monitoring rulesets. It allows security teams to use version control systems and CI/CD pipelines to automatically deploy Wazuh rules and decoders. This approach leverages the principles of infrastructure as code (IaC) to enable collaboration, change tracking, and rollback […]

Read more
Wazuh and Graybox Security Announce Partnership to Deliver Advanced Cybersecurity Services

Wazuh and Graybox Security Announce Partnership to Deliver Advanced Cybersecurity Services

Post icon
/ News
By

San Jose, California, July 2025 – Wazuh, the leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, has partnered with Graybox Security, a trusted cybersecurity firm providing tailored 24/7 managed detection and response, testing, incident response, and advisory services to mid-to-large organizations, including S&P 500 companies and […]

Read more
Post icon
/ News

Wazuh and Graybox Security Announce Partnership to Deliver Advanced Cybersecurity Services

By

San Jose, California, July 2025 – Wazuh, the leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, has partnered with Graybox Security, a trusted cybersecurity firm providing tailored 24/7 managed detection and response, testing, incident response, and advisory services to mid-to-large organizations, including S&P 500 companies and […]

Read more
Integrating ESET PROTECT Hub with Wazuh

Integrating ESET PROTECT Hub with Wazuh

Post icon
/ Engineering
By

ESET PROTECT Hub allows administrators to manage identities, licenses, and users across various ESET services from a single location. These services, including ESET PROTECT, ESET Inspect, and ESET Cloud Office Security, are designed to provide threat detection and endpoint protection solutions for businesses and individuals. Wazuh is an open source security platform designed for threat […]

Read more
Post icon
/ Engineering

Integrating ESET PROTECT Hub with Wazuh

By

ESET PROTECT Hub allows administrators to manage identities, licenses, and users across various ESET services from a single location. These services, including ESET PROTECT, ESET Inspect, and ESET Cloud Office Security, are designed to provide threat detection and endpoint protection solutions for businesses and individuals. Wazuh is an open source security platform designed for threat […]

Read more
Detecting and responding Mamona ransomware with Wazuh

Detecting and responding Mamona ransomware with Wazuh

Post icon
/ Engineering
By

Mamona is a lightweight ransomware strain that is widely available and primarily targets Windows endpoints. Unlike more sophisticated ransomware families, it operates entirely offline, encrypting files locally without any command-and-control (C2) communication or data exfiltration. This absence of network activity makes it harder to detect using network traffic analysis alone. Mamona ransomware uses custom encryption […]

Read more
Post icon
/ Engineering

Detecting and responding Mamona ransomware with Wazuh

By

Mamona is a lightweight ransomware strain that is widely available and primarily targets Windows endpoints. Unlike more sophisticated ransomware families, it operates entirely offline, encrypting files locally without any command-and-control (C2) communication or data exfiltration. This absence of network activity makes it harder to detect using network traffic analysis alone. Mamona ransomware uses custom encryption […]

Read more
Keep up to date
with our digest of articles