Blog search results for 'Awwal Ishiaku'

Showing 12 of 13 results

Detecting keyloggers (T1056.001) on Linux endpoints

Blog / Engineering / Detecting keyloggers (T1056.001) on Linux endpoints

Keyloggers are spyware that monitor and record user keystrokes on endpoints. Some variants relay the recorded data to an external party or attacker, enabling threat actors to exfiltrate user credentials...

Integrating Cisco Secure Endpoint with Wazuh

Blog / Engineering / Integrating Cisco Secure Endpoint with Wazuh

In this blog post, we combine the capabilities of Cisco Secure Endpoint with the versatility of Wazuh, a unified XDR and SIEM platform. Cisco Secure Endpoint offers cloud-delivered endpoint detection...

Detecting Spring4Shell (CVE-2022-22965) with Wazuh

Blog / Engineering / Detecting Spring4Shell (CVE-2022-22965) with Wazuh

A remote code execution (RCE) vulnerability that affects the Spring Java framework has been discovered. The vulnerability is dubbed Spring4Shell or SpringShell by the security community. It has the designation...

Detecting PwnKit (CVE-2021-4034) with Wazuh

Blog / Engineering / Detecting PwnKit (CVE-2021-4034) with Wazuh

Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating systems. It provides an organized way for non-privileged processes to communicate with privileged ones. In contrast to...

Analyzing ModSecurity events with Wazuh

Blog / Engineering / Analyzing ModSecurity events with Wazuh

In this blog post, we explain how to analyze ModSecurity events with Wazuh. Wazuh is a unified XDR and SIEM solution. It can be used to collect, analyze and correlate...