Submitting the form

All results for 'Rolly Davany Mougoue Kakanou'

Showing 5 of 5 results

Integrating ESET PROTECT Hub with Wazuh

Blog / Engineering / Integrating ESET PROTECT Hub with Wazuh

ESET PROTECT Hub allows administrators to manage identities, licenses, and users across various ESET services from a single location. These services, including ESET PROTECT, ESET Inspect, and ESET Cloud Office Security, are designed to provide threat detection and endpoint protection solutions for businesses and individuals. Wazuh is an open source security platform designed for threat […]

Wazuh agent groups and centralized configuration

Blog / Engineering / Wazuh agent groups and centralized configuration

Centralized configuration management offers a unified approach for organizing, controlling, and modifying configurations within a large infrastructure. They mitigate the challenges associated with manual configuration management, such as human errors, inconsistencies, and time-consuming updates. Wazuh, the unified XDR and SIEM platform, offers a feature for streamlining agent configuration and enhancing security management: Wazuh agent groups […]

Hunting for Windows credential access attacks with Wazuh

Blog / Engineering / Hunting for Windows credential access attacks with Wazuh

Credential access attacks have become over time one of the critical security concerns for organizations. This phase of an attack, where adversaries obtain access to sensitive credentials, poses the most significant threat. It enables adversaries to gain unauthorized entry into systems, facilitating lateral movement and privilege escalation within the targeted environment. This stealthy approach makes […]

Hunting for Linux credential access attacks with Wazuh

Blog / Engineering / Hunting for Linux credential access attacks with Wazuh

Credential access attacks are cyber attacks that aim to obtain users’ login credentials. These credentials can include usernames, passwords, security tokens, or other authentication information. They remain one of the critical security threats for organizations. It enables adversaries to gain unauthorized access to systems, facilitating lateral movement and privilege escalation within the targeted environment. This […]

BLX stealer detection and response using Wazuh

Blog / Engineering / BLX stealer detection and response using Wazuh

BLX stealer, also known as XLABB Stealer is a malware designed to steal sensitive information like credentials, payment data, and cryptocurrency wallets from infected endpoints. It uses advanced evasion techniques, process injection, and file encryption to bypass traditional security tools, making it a serious threat to individuals and organizations.  BLX Stealer is actively promoted on […]

No results for 'Rolly Davany Mougoue Kakanou'

Please make sure that all words are spelled correctly.