Introducing Wazuh 4.14.0

Introducing Wazuh 4.14.0

Post icon
/ News
By

We’re excited to announce the release of Wazuh 4.14.0. This version enhances the IT Hygiene capability with an expanded inventory that now includes browser extensions, endpoint services, users, and groups. It also introduces a new Microsoft Graph API dashboard for monitoring activity and audit events from Microsoft cloud services, and adds support for hot reload […]

Read more
Post icon
/ News

Introducing Wazuh 4.14.0

By

We’re excited to announce the release of Wazuh 4.14.0. This version enhances the IT Hygiene capability with an expanded inventory that now includes browser extensions, endpoint services, users, and groups. It also introduces a new Microsoft Graph API dashboard for monitoring activity and audit events from Microsoft cloud services, and adds support for hot reload […]

Read more
Wazuh agent deployment strategies for persistence in Kubernetes

Wazuh agent deployment strategies for persistence in Kubernetes

Post icon
/ Engineering
By and

The Wazuh agent is a component of the Wazuh SIEM and XDR solution that protects monitored endpoints such as servers, laptops, and virtual machines. Deploying Wazuh agents in containerized endpoints orchestrated by Kubernetes requires a more resilient deployment strategy. In containerized environments where workloads are ephemeral and dynamic, maintaining a persistent identity and configuration for […]

Read more
Post icon
/ Engineering

Wazuh agent deployment strategies for persistence in Kubernetes

By and

The Wazuh agent is a component of the Wazuh SIEM and XDR solution that protects monitored endpoints such as servers, laptops, and virtual machines. Deploying Wazuh agents in containerized endpoints orchestrated by Kubernetes requires a more resilient deployment strategy. In containerized environments where workloads are ephemeral and dynamic, maintaining a persistent identity and configuration for […]

Read more
Wazuh Partners with Saga doo Beograd to Deliver Scalable Cybersecurity Solutions in Serbia

Wazuh Partners with Saga doo Beograd to Deliver Scalable Cybersecurity Solutions in Serbia

Post icon
/ News
By

San Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, has partnered with Saga doo Beograd, one of the largest system integration companies in Serbia. Through this collaboration, Saga doo Beograd will integrate Wazuh’s SIEM and XDR capabilities into its cybersecurity offerings, […]

Read more
Post icon
/ News

Wazuh Partners with Saga doo Beograd to Deliver Scalable Cybersecurity Solutions in Serbia

By

San Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, has partnered with Saga doo Beograd, one of the largest system integration companies in Serbia. Through this collaboration, Saga doo Beograd will integrate Wazuh’s SIEM and XDR capabilities into its cybersecurity offerings, […]

Read more
Detecting Maranhão Stealer with Wazuh

Detecting Maranhão Stealer with Wazuh

Post icon
/ Engineering
By

Maranhão Stealer is a Node.js-based infostealer delivered through pirated software and trojanized video game installers. Threat actors lure victims with cracked or modified game launchers that secretly install the malware on Windows systems. Once installed, Maranhão Stealer harvests sensitive data, such as browser credentials, cookies, cryptocurrency wallets, and other valuable information.  The malware targets common […]

Read more
Post icon
/ Engineering

Detecting Maranhão Stealer with Wazuh

By

Maranhão Stealer is a Node.js-based infostealer delivered through pirated software and trojanized video game installers. Threat actors lure victims with cracked or modified game launchers that secretly install the malware on Windows systems. Once installed, Maranhão Stealer harvests sensitive data, such as browser credentials, cookies, cryptocurrency wallets, and other valuable information.  The malware targets common […]

Read more
Wazuh and Shuffle Announce Technology Partnership to Deliver Integrated Security Automation

Wazuh and Shuffle Announce Technology Partnership to Deliver Integrated Security Automation

Post icon
/ News
By

San Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a technology partnership with Shuffle, a Security Orchestration, Automation and Response (SOAR) platform designed to simplify and scale cybersecurity operations. Through this integration, Shuffle connects seamlessly with Wazuh to provide out-of-the-box […]

Read more
Post icon
/ News

Wazuh and Shuffle Announce Technology Partnership to Deliver Integrated Security Automation

By

San Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a technology partnership with Shuffle, a Security Orchestration, Automation and Response (SOAR) platform designed to simplify and scale cybersecurity operations. Through this integration, Shuffle connects seamlessly with Wazuh to provide out-of-the-box […]

Read more
Detecting Gunra ransomware with Wazuh

Detecting Gunra ransomware with Wazuh

Post icon
/ Engineering
By

Gunra ransomware is a recently identified threat that has been observed targeting Windows endpoints across multiple industries worldwide, including manufacturing and energy sectors. Known for its encryption capabilities and exfiltration tactics, the ransomware follows a double-extortion model, encrypting victim data while simultaneously threatening to leak stolen information on its Tor-hosted leak site. Gunra’s malicious behavior […]

Read more
Post icon
/ Engineering

Detecting Gunra ransomware with Wazuh

By

Gunra ransomware is a recently identified threat that has been observed targeting Windows endpoints across multiple industries worldwide, including manufacturing and energy sectors. Known for its encryption capabilities and exfiltration tactics, the ransomware follows a double-extortion model, encrypting victim data while simultaneously threatening to leak stolen information on its Tor-hosted leak site. Gunra’s malicious behavior […]

Read more
Security observability on Linux with Wazuh and Tetragon

Security observability on Linux with Wazuh and Tetragon

Post icon
/ Engineering
By

Security observability allows security teams to gain comprehensive visibility into the security posture of systems, applications, and networks by collecting and analyzing telemetry from various sources. These data sources, including logs, metrics, and traces, provide deep insights into diagnosing system issues and investigating security incidents. They also help to detect and respond to potential threats […]

Read more
Post icon
/ Engineering

Security observability on Linux with Wazuh and Tetragon

By

Security observability allows security teams to gain comprehensive visibility into the security posture of systems, applications, and networks by collecting and analyzing telemetry from various sources. These data sources, including logs, metrics, and traces, provide deep insights into diagnosing system issues and investigating security incidents. They also help to detect and respond to potential threats […]

Read more
Detecting Koske malware with Wazuh

Detecting Koske malware with Wazuh

Post icon
/ Engineering
By

Koske malware is a new, trending malware that Aqua Nautilus first identified in July 2025. It is believed to be an AI-generated malware designed for cryptocurrency mining operations on Linux endpoints. The structure and characteristics of its code suggest that it may have been developed using large language models (LLMs) or automation frameworks. Koske is […]

Read more
Post icon
/ Engineering

Detecting Koske malware with Wazuh

By

Koske malware is a new, trending malware that Aqua Nautilus first identified in July 2025. It is believed to be an AI-generated malware designed for cryptocurrency mining operations on Linux endpoints. The structure and characteristics of its code suggest that it may have been developed using large language models (LLMs) or automation frameworks. Koske is […]

Read more
Wazuh and Lumu Announce Partnership to Deliver Integrated Threat Intelligence

Wazuh and Lumu Announce Partnership to Deliver Integrated Threat Intelligence

Post icon
/ News
By

San Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a partnership with Lumu, a cybersecurity company that enables organizations to measure and understand compromise in real time through its Continuous Compromise Assessment model.  This integration enhances Wazuh’s SIEM and XDR […]

Read more
Post icon
/ News

Wazuh and Lumu Announce Partnership to Deliver Integrated Threat Intelligence

By

San Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a partnership with Lumu, a cybersecurity company that enables organizations to measure and understand compromise in real time through its Continuous Compromise Assessment model.  This integration enhances Wazuh’s SIEM and XDR […]

Read more
Introducing Wazuh 4.13.0

Introducing Wazuh 4.13.0

Post icon
/ Releases
By

We are pleased to announce the release of Wazuh 4.13.0, a version that enhances data visibility, threat intelligence, and strengthens platform resilience. Key highlights include the introduction of the IT Hygiene dashboard, which provides users with the ability to centrally view and query IT Hygiene data. This release delivers new Wazuh CDB lists enriched with […]

Read more
Post icon
/ Releases

Introducing Wazuh 4.13.0

By

We are pleased to announce the release of Wazuh 4.13.0, a version that enhances data visibility, threat intelligence, and strengthens platform resilience. Key highlights include the introduction of the IT Hygiene dashboard, which provides users with the ability to centrally view and query IT Hygiene data. This release delivers new Wazuh CDB lists enriched with […]

Read more
Network security monitoring with Wazuh and Zeek

Network security monitoring with Wazuh and Zeek

Post icon
/ Engineering
By and

Network security focuses on ensuring the integrity, confidentiality, and availability of computer networks and data by preventing unauthorized access, misuse, or disruption. Continuous network monitoring provides visibility into network activity, enabling organizations to detect issues, optimize performance, and identify potential threats before they escalate into serious incidents. Wazuh is an open source SIEM/XDR platform that […]

Read more
Post icon
/ Engineering

Network security monitoring with Wazuh and Zeek

By and

Network security focuses on ensuring the integrity, confidentiality, and availability of computer networks and data by preventing unauthorized access, misuse, or disruption. Continuous network monitoring provides visibility into network activity, enabling organizations to detect issues, optimize performance, and identify potential threats before they escalate into serious incidents. Wazuh is an open source SIEM/XDR platform that […]

Read more
Wazuh and SmarTech-IT Announce Partnership to Strengthen Cybersecurity for European Organizations

Wazuh and SmarTech-IT Announce Partnership to Strengthen Cybersecurity for European Organizations

Post icon
/ News
By

San Jose, California, August 2025 – Wazuh, the leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, today announced a partnership with SmarTech-IT, a cybersecurity solutions provider serving small and medium-sized businesses, healthcare organizations, and local governments across Europe. SmarTech-IT will integrate Wazuh as its core open-source […]

Read more
Post icon
/ News

Wazuh and SmarTech-IT Announce Partnership to Strengthen Cybersecurity for European Organizations

By

San Jose, California, August 2025 – Wazuh, the leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, today announced a partnership with SmarTech-IT, a cybersecurity solutions provider serving small and medium-sized businesses, healthcare organizations, and local governments across Europe. SmarTech-IT will integrate Wazuh as its core open-source […]

Read more
Detecting and responding to Apos malware with Wazuh

Detecting and responding to Apos malware with Wazuh

Post icon
By

Apos, first identified in April 2024, has drawn significant attention in the security community due to its stealthy behavior and layered infection chain. Unlike opportunistic threats that indiscriminately target systems, Apos demonstrates a calculated focus on persistence and evasion. The malware often masquerades as legitimate software components, mimicking processes such as Chrome extension updates to […]

Read more
Post icon

Detecting and responding to Apos malware with Wazuh

By

Apos, first identified in April 2024, has drawn significant attention in the security community due to its stealthy behavior and layered infection chain. Unlike opportunistic threats that indiscriminately target systems, Apos demonstrates a calculated focus on persistence and evasion. The malware often masquerades as legitimate software components, mimicking processes such as Chrome extension updates to […]

Read more
Keep up to date
with our digest of articles