Building IoC files for threat intelligence with Wazuh XDR
This blog post shows how we leverage the Wazuh XDR capability to identify and store IoCs detected in an organization’s infrastructure.
This blog post shows how we leverage the Wazuh XDR capability to identify and store IoCs detected in an organization’s infrastructure.
In this blog post we have shown how Wazuh detects the presence of suspicious and malicious LNK files in Windows endpoints.
Our new blog post shows how to detect common Linux persistence techniques with Wazuh by covering several common techniques.
Installing a web shell on a web server is one way of achieving persistence. In our new blog post, we use Wazuh to detect web shell attacks.
In this blog post, you can learn about Docker container security monitoring with Wazuh by monitoring Docker container events.
A botnet is a network of compromised internet-connected devices such as personal computers, servers, and Internet of Things (IoT) devices used to orchestrate cyberattacks. Recently, in June 2022, an IoT...