Blog / Engineering / Threat hunting using inventory data collected by Wazuh
Threat hunting is a proactive cybersecurity approach focused on actively searching for indicators of compromise (IOCs) or indicators of attack (IOAs) within an organization’s IT environment. To maintain a good...
Blog / Engineering / Detecting Sliver C2 framework with Wazuh
Sliver C2 is a command and control (C2) framework that is used to remotely control compromised endpoints. It is an open source alternative to other C2 frameworks such as Cobalt...
Blog / Engineering / Wazuh integration with AWS SNS
AWS Simple Notification Service (SNS) is a fully managed messaging service that enables sending notifications from the cloud. It supports publishing messages to various endpoints like AWS services, email, SMS,...
Blog / Engineering / Integrating Imperva cloud web application firewall (CWAF) with Wazuh
Imperva Cloud WAF is a web application security firewall that protects against security threats, including OWASP Top 10, such as cross-site scripting, illegal resource access, and remote file inclusion. Web...
Blog / Engineering / Ensuring NIS2 compliance with Wazuh
Network and Information Systems (NIS2) is a European Union (EU) legislation raising cybersecurity standards for businesses due to new cyber threats across the EU. It’s an update and expansion of...