Addressing the CVE-2025-24016 vulnerability

Addressing the CVE-2025-24016 vulnerability

Post icon
/ Engineering
By

Recent articles have linked CVE-2025-24016, an old Wazuh server vulnerability, to botnet activity via remote code execution. This issue was fixed in October 2024 with version 4.9.1. Any instance running 4.9.1 or later is fully patched and secure. It’s also important to understand the nature of CVE-2025-24016. This is an authenticated vulnerability, meaning it can […]

Read more
Post icon
/ Engineering

Addressing the CVE-2025-24016 vulnerability

By

Recent articles have linked CVE-2025-24016, an old Wazuh server vulnerability, to botnet activity via remote code execution. This issue was fixed in October 2024 with version 4.9.1. Any instance running 4.9.1 or later is fully patched and secure. It’s also important to understand the nature of CVE-2025-24016. This is an authenticated vulnerability, meaning it can […]

Read more
Introducing Wazuh CTI

Introducing Wazuh CTI

Post icon
/ Releases
By

The Wazuh Cyber Threat Intelligence (CTI) service is a publicly accessible platform that collects, analyzes, and disseminates actionable information on emerging cyber threats and vulnerabilities. The service launches with a focus on vulnerability intelligence, delivering timely updates on Common Vulnerabilities and Exposures (CVEs), severity scores, exploitability insights, and mitigation strategies. It aggregates and sanitizes data […]

Read more
Post icon
/ Releases

Introducing Wazuh CTI

By

The Wazuh Cyber Threat Intelligence (CTI) service is a publicly accessible platform that collects, analyzes, and disseminates actionable information on emerging cyber threats and vulnerabilities. The service launches with a focus on vulnerability intelligence, delivering timely updates on Common Vulnerabilities and Exposures (CVEs), severity scores, exploitability insights, and mitigation strategies. It aggregates and sanitizes data […]

Read more
Monitoring Hyper-V with Wazuh

Monitoring Hyper-V with Wazuh

Post icon
/ Engineering
By

Microsoft Hyper-V is a widely used virtualization platform in enterprise environments, powering everything from development labs to production workloads.

Read more
Post icon
/ Engineering

Monitoring Hyper-V with Wazuh

By

Microsoft Hyper-V is a widely used virtualization platform in enterprise environments, powering everything from development labs to production workloads.

Read more
Enhancing Linux security with AppArmor and Wazuh

Enhancing Linux security with AppArmor and Wazuh

Post icon
/ Engineering
By

The Linux operating system is widely deployed across various systems, from embedded devices to cloud infrastructure. Its popular use makes it a frequent target for threat actors, increasing the importance of enforced security mechanisms. Linux uses the Discretionary Access Control (DAC) permission model by default. In this model, the owner of a file or process […]

Read more
Post icon
/ Engineering

Enhancing Linux security with AppArmor and Wazuh

By

The Linux operating system is widely deployed across various systems, from embedded devices to cloud infrastructure. Its popular use makes it a frequent target for threat actors, increasing the importance of enforced security mechanisms. Linux uses the Discretionary Access Control (DAC) permission model by default. In this model, the owner of a file or process […]

Read more
Detecting Chrome CVE-2025-4664 vulnerability with Wazuh

Detecting Chrome CVE-2025-4664 vulnerability with Wazuh

Post icon
/ Engineering
By and

A newly disclosed zero-day vulnerability, tracked as CVE-2025-4664, has recently been discovered to affect Google Chrome and Chromium web browsers on Windows and Linux endpoints, respectively. This vulnerability affects the Loader component of the browser, causing serious implications for cross-origin data protection, especially in environments that rely on Chrome’s referrer policies for safeguarding sensitive information. […]

Read more
Post icon
/ Engineering

Detecting Chrome CVE-2025-4664 vulnerability with Wazuh

By and

A newly disclosed zero-day vulnerability, tracked as CVE-2025-4664, has recently been discovered to affect Google Chrome and Chromium web browsers on Windows and Linux endpoints, respectively. This vulnerability affects the Loader component of the browser, causing serious implications for cross-origin data protection, especially in environments that rely on Chrome’s referrer policies for safeguarding sensitive information. […]

Read more
Detecting FrigidStealer malware with Wazuh

Detecting FrigidStealer malware with Wazuh

Post icon
/ Engineering
By and

FrigidStealer is an information-stealing malware that emerged in January 2025. It targets macOS endpoints to steal sensitive user data through deceptive tactics. Unlike traditional malware, FrigidStealer exploits user trust in routine software updates, making it particularly insidious. As a significant threat, it underscores the need for extended security measures on macOS endpoints. The malware’s financial […]

Read more
Post icon
/ Engineering

Detecting FrigidStealer malware with Wazuh

By and

FrigidStealer is an information-stealing malware that emerged in January 2025. It targets macOS endpoints to steal sensitive user data through deceptive tactics. Unlike traditional malware, FrigidStealer exploits user trust in routine software updates, making it particularly insidious. As a significant threat, it underscores the need for extended security measures on macOS endpoints. The malware’s financial […]

Read more
Detecting and responding to InvisibleFerret with Wazuh

Detecting and responding to InvisibleFerret with Wazuh

Post icon
/ Engineering
By

InvisibleFerret is a Python-based backdoor malware that affects both Windows and Linux endpoints. It is used in targeted campaigns by North Korean threat actors, particularly the notorious Lazarus Group. This malware is deployed through advanced social engineering tactics, often disguised as part of legitimate job recruitment processes. Threat actors impersonate recruiters, luring victims, primarily professionals […]

Read more
Post icon
/ Engineering

Detecting and responding to InvisibleFerret with Wazuh

By

InvisibleFerret is a Python-based backdoor malware that affects both Windows and Linux endpoints. It is used in targeted campaigns by North Korean threat actors, particularly the notorious Lazarus Group. This malware is deployed through advanced social engineering tactics, often disguised as part of legitimate job recruitment processes. Threat actors impersonate recruiters, luring victims, primarily professionals […]

Read more
Introducing Wazuh 4.12.0

Introducing Wazuh 4.12.0

Post icon
/ Releases
By

We are excited to announce the release of Wazuh 4.12.0. This release introduces support for ARM architecture in the central components, expanding compatibility across various hardware environments. It also enhances threat intelligence capabilities by incorporating Wazuh CTI reference into CVE data, providing better context for vulnerability assessment. Additionally, this release adds eBPF support to the […]

Read more
Post icon
/ Releases

Introducing Wazuh 4.12.0

By

We are excited to announce the release of Wazuh 4.12.0. This release introduces support for ARM architecture in the central components, expanding compatibility across various hardware environments. It also enhances threat intelligence capabilities by incorporating Wazuh CTI reference into CVE data, providing better context for vulnerability assessment. Additionally, this release adds eBPF support to the […]

Read more
Detecting Windows persistence techniques with Wazuh

Detecting Windows persistence techniques with Wazuh

Post icon
/ Engineering
By

Persistence techniques refer to methods attackers or malicious software use to maintain access to a compromised endpoint even after reboots, logouts, or other interruptions. These techniques ensure that the malware or unauthorized user remains active and can continue to execute malicious activities without re-exploitation. Common Windows persistence techniques involve modifying startup scripts, abusing scheduled tasks […]

Read more
Post icon
/ Engineering

Detecting Windows persistence techniques with Wazuh

By

Persistence techniques refer to methods attackers or malicious software use to maintain access to a compromised endpoint even after reboots, logouts, or other interruptions. These techniques ensure that the malware or unauthorized user remains active and can continue to execute malicious activities without re-exploitation. Common Windows persistence techniques involve modifying startup scripts, abusing scheduled tasks […]

Read more
Detecting Medusa ransomware with Wazuh

Detecting Medusa ransomware with Wazuh

Post icon
/ Engineering
By

Medusa is a ransomware-as-a-service (RaaS) variant, first observed in June 2021. Its operators and affiliates have impacted over 300 organizations across multiple sectors, including healthcare, education, legal, insurance, technology, and manufacturing. The ransomware is primarily delivered through phishing campaigns and the exploitation of unpatched software vulnerabilities.

Read more
Post icon
/ Engineering

Detecting Medusa ransomware with Wazuh

By

Medusa is a ransomware-as-a-service (RaaS) variant, first observed in June 2021. Its operators and affiliates have impacted over 300 organizations across multiple sectors, including healthcare, education, legal, insurance, technology, and manufacturing. The ransomware is primarily delivered through phishing campaigns and the exploitation of unpatched software vulnerabilities.

Read more
Monitoring Rapid SCADA with Wazuh

Monitoring Rapid SCADA with Wazuh

Post icon
/ Engineering
By

Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and controlling industrial processes. Rapid SCADA is an open source SCADA platform used for data acquisition, automation, and remote control in industrial and critical infrastructure systems. It can be deployed on Windows or Linux endpoints, making it a flexible solution for different environments. Like […]

Read more
Post icon
/ Engineering

Monitoring Rapid SCADA with Wazuh

By

Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and controlling industrial processes. Rapid SCADA is an open source SCADA platform used for data acquisition, automation, and remote control in industrial and critical infrastructure systems. It can be deployed on Windows or Linux endpoints, making it a flexible solution for different environments. Like […]

Read more
Detecting Impacket with Wazuh

Detecting Impacket with Wazuh

Post icon
/ Engineering
By

Impacket is a collection of Python-based scripts designed for manipulating network protocols and exploiting Windows services. It contains several tools for remote service execution, Kerberos manipulation, Windows credential dumping, packet sniffing, and relay attacks.  Although Red teamers use Impacket for authorized testing, threat actors frequently misuse it for lateral movement, privilege escalation, and data exfiltration […]

Read more
Post icon
/ Engineering

Detecting Impacket with Wazuh

By

Impacket is a collection of Python-based scripts designed for manipulating network protocols and exploiting Windows services. It contains several tools for remote service execution, Kerberos manipulation, Windows credential dumping, packet sniffing, and relay attacks.  Although Red teamers use Impacket for authorized testing, threat actors frequently misuse it for lateral movement, privilege escalation, and data exfiltration […]

Read more
Detecting and removing Sosano backdoor malware with Wazuh

Detecting and removing Sosano backdoor malware with Wazuh

Post icon
/ Engineering
By

The Sosano backdoor emerged in late 2024 as a stealthy malware strain. It was used in a highly targeted campaign against organizations in critical sectors, including aviation, satellite communications, and transportation infrastructure. What sets the Sosano backdoor apart is its use of polyglot files – a rare and sophisticated technique that allows malware to masquerade […]

Read more
Post icon
/ Engineering

Detecting and removing Sosano backdoor malware with Wazuh

By

The Sosano backdoor emerged in late 2024 as a stealthy malware strain. It was used in a highly targeted campaign against organizations in critical sectors, including aviation, satellite communications, and transportation infrastructure. What sets the Sosano backdoor apart is its use of polyglot files – a rare and sophisticated technique that allows malware to masquerade […]

Read more
Keep up to date
with our digest of articles