Blog search results for 'Rolly Davany Mougoue Kakanou'

Showing 4 of 4 results

Hunting for Linux credential access attacks with Wazuh

Blog / Engineering / Hunting for Linux credential access attacks with Wazuh

Credential access attacks are cyber attacks that aim to obtain users’ login credentials. These credentials can include usernames, passwords, security tokens, or other authentication information. They remain one of the...

Wazuh agent groups and centralized configuration

Blog / Engineering / Wazuh agent groups and centralized configuration

Centralized configuration management offers a unified approach for organizing, controlling, and modifying configurations within a large infrastructure. They mitigate the challenges associated with manual configuration management, such as human errors,...