Detecting Metasploit attacks
We are going to attack a vulnerable server using Metasploit and then we will see how to use Wazuh to detect various of its attacks. This framework is the most used penetration...
We are going to attack a vulnerable server using Metasploit and then we will see how to use Wazuh to detect various of its attacks. This framework is the most used penetration...
Wazuh Cloud platform has been validated as PCI DSS Level 1 Service Provider compliant. Our main priority at Wazuh is keeping our customers safe.
Learn how to use the file integrity monitoring module to prevent and detect ransomware. Keep your system safe with Wazuh.
Wazuh agents move through all the stages of their life cycle, sometimes leaving agents permanently disconnected. Learn how to purge these kinds of agents.
Today we are pleased to announce the release of Wazuh v2.1.0. We have added new features and fixed several bugs. You can find all the details in our release notes and changelog file. Additionally,...
Today's post is about using Open Source Intelligence, OSINT and CDB lists. We're going to block all IPs that Wazuh finds in our CDB lists
In this post, we will discuss how to blocking attacks using the active response feature in OSSEC. In this example, we simulate an SSH Brute Force attack.
We will learn how to updating the ruleset automatically. The ruleset is one of the most important parts of OSSEC and there are two ways to updating it.