The global pandemic in 2020 gave rise to more companies adopting remote working tools, services, and collaboration solutions. But organizations that utilize remote work services expose themselves to a wider...
Blog search results for 'Wazuh'Showing 12 of 144 results
Wazuh has signed a partnership agreement with NE Brasil , a business consulting services company.
This blog shows how Wazuh can detect some common Active Directory attacks using Windows security logs and events captured on Sysmon.
Our new blog post shows how Wazuh can detect generic and obfuscated hoaxshell payloads and other attacks that abuse PowerShell.
Installing a web shell on a web server is one way of achieving persistence. In our new blog post, we use Wazuh to detect web shell attacks.
In this blog post, we use Wazuh to detect vulnerable versions of Apache Commons Text Library Text4Shell and monitor the endpoints.
STRRAT is a Java-based remote access trojan (RAT) that provides threat actors with full remote control of infected Windows endpoints. STRRAT focuses on stealing credentials from browsers and email clients...
Wazuh has signed a partnership agreement with Tis Tech, a business consulting services company.
Check our new blog post to learn how to analyze the Indicators of Compromise (IOCs) of Chaos malware and mitigate the infection using Wazuh.
It is essential to log and audit Kubernetes cluster events. Check our new blog post to learn how to audit Kubernetes events with Wazuh.
OpenSSL is a popular open source cryptography library. Applications that secure communication over computer networks use OpenSSL to implement SSL (Secure Socket Layer) and TLS (Transport Layer Security). OpenSSL provides...
San Jose, California, November 2022. We are glad to announce that GC Security has signed a partnership agreement with Wazuh.