Submitting the form

All results for 'Ifeanyi Onyia Odike'

Showing 7 of 7 results

Introducing Wazuh 4.6.0

Blog / Releases / Introducing Wazuh 4.6.0

We are excited to announce the release of Wazuh 4.6.0, with new and enhanced capabilities, new use cases, and improved documentation. This marks a significant achievement for our project and...

Monitoring network devices with Wazuh

Blog / Engineering / Monitoring network devices with Wazuh

A network device is a hardware or software component that facilitates the transfer of data and information between nodes within a network. Common types of network devices include routers, switches,...

Detecting Living Off the Land attacks with Wazuh

Blog / Engineering / Detecting Living Off the Land attacks with Wazuh

Living Off the Land (LOTL) attacks are a cyber threat technique in which attackers leverage existing, legitimate tools and features within an environment to conduct malicious activities. This approach allows...

Detecting compromised accounts with HIBP and Wazuh

Blog / Engineering / Detecting compromised accounts with HIBP and Wazuh

Data breaches and leaked credentials have become a recurring threat in the cybersecurity landscape, exposing sensitive information such as usernames, passwords, and email addresses. When attackers gain access to this...

No results for 'Ifeanyi Onyia Odike'

Please make sure that all words are spelled correctly.