Wazuh and Athena Security Group Announce Partnership to Enhance Cyber Defense Capabilities
San Jose, California, October 2025 – Wazuh, the...
San Jose, California, October 2025 – Wazuh, the...
We’re excited to announce the release of Wazuh 4.14.0. This version enhances the IT Hygiene capability with an expanded inventory that now includes browser extensions, endpoint services, users, and groups. It also introduces a new Microsoft Graph API dashboard for monitoring activity and audit events from Microsoft cloud services, and adds support for hot reload […]
Read moreWe’re excited to announce the release of Wazuh 4.14.0. This version enhances the IT Hygiene capability with an expanded inventory that now includes browser extensions, endpoint services, users, and groups. It also introduces a new Microsoft Graph API dashboard for monitoring activity and audit events from Microsoft cloud services, and adds support for hot reload […]
Read moreThe Wazuh agent is a component of the Wazuh SIEM and XDR solution that protects monitored endpoints such as servers, laptops, and virtual machines. Deploying Wazuh agents in containerized endpoints orchestrated by Kubernetes requires a more resilient deployment strategy. In containerized environments where workloads are ephemeral and dynamic, maintaining a persistent identity and configuration for […]
Read moreThe Wazuh agent is a component of the Wazuh SIEM and XDR solution that protects monitored endpoints such as servers, laptops, and virtual machines. Deploying Wazuh agents in containerized endpoints orchestrated by Kubernetes requires a more resilient deployment strategy. In containerized environments where workloads are ephemeral and dynamic, maintaining a persistent identity and configuration for […]
Read moreSan Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, has partnered with Saga doo Beograd, one of the largest system integration companies in Serbia. Through this collaboration, Saga doo Beograd will integrate Wazuh’s SIEM and XDR capabilities into its cybersecurity offerings, […]
Read moreSan Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, has partnered with Saga doo Beograd, one of the largest system integration companies in Serbia. Through this collaboration, Saga doo Beograd will integrate Wazuh’s SIEM and XDR capabilities into its cybersecurity offerings, […]
Read moreMaranhão Stealer is a Node.js-based infostealer delivered through pirated software and trojanized video game installers. Threat actors lure victims with cracked or modified game launchers that secretly install the malware on Windows systems. Once installed, Maranhão Stealer harvests sensitive data, such as browser credentials, cookies, cryptocurrency wallets, and other valuable information. The malware targets common […]
Read moreMaranhão Stealer is a Node.js-based infostealer delivered through pirated software and trojanized video game installers. Threat actors lure victims with cracked or modified game launchers that secretly install the malware on Windows systems. Once installed, Maranhão Stealer harvests sensitive data, such as browser credentials, cookies, cryptocurrency wallets, and other valuable information. The malware targets common […]
Read moreSan Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a technology partnership with Shuffle, a Security Orchestration, Automation and Response (SOAR) platform designed to simplify and scale cybersecurity operations. Through this integration, Shuffle connects seamlessly with Wazuh to provide out-of-the-box […]
Read moreSan Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a technology partnership with Shuffle, a Security Orchestration, Automation and Response (SOAR) platform designed to simplify and scale cybersecurity operations. Through this integration, Shuffle connects seamlessly with Wazuh to provide out-of-the-box […]
Read moreGunra ransomware is a recently identified threat that has been observed targeting Windows endpoints across multiple industries worldwide, including manufacturing and energy sectors. Known for its encryption capabilities and exfiltration tactics, the ransomware follows a double-extortion model, encrypting victim data while simultaneously threatening to leak stolen information on its Tor-hosted leak site. Gunra’s malicious behavior […]
Read moreGunra ransomware is a recently identified threat that has been observed targeting Windows endpoints across multiple industries worldwide, including manufacturing and energy sectors. Known for its encryption capabilities and exfiltration tactics, the ransomware follows a double-extortion model, encrypting victim data while simultaneously threatening to leak stolen information on its Tor-hosted leak site. Gunra’s malicious behavior […]
Read moreSecurity observability allows security teams to gain comprehensive visibility into the security posture of systems, applications, and networks by collecting and analyzing telemetry from various sources. These data sources, including logs, metrics, and traces, provide deep insights into diagnosing system issues and investigating security incidents. They also help to detect and respond to potential threats […]
Read moreSecurity observability allows security teams to gain comprehensive visibility into the security posture of systems, applications, and networks by collecting and analyzing telemetry from various sources. These data sources, including logs, metrics, and traces, provide deep insights into diagnosing system issues and investigating security incidents. They also help to detect and respond to potential threats […]
Read moreKoske malware is a new, trending malware that Aqua Nautilus first identified in July 2025. It is believed to be an AI-generated malware designed for cryptocurrency mining operations on Linux endpoints. The structure and characteristics of its code suggest that it may have been developed using large language models (LLMs) or automation frameworks. Koske is […]
Read moreKoske malware is a new, trending malware that Aqua Nautilus first identified in July 2025. It is believed to be an AI-generated malware designed for cryptocurrency mining operations on Linux endpoints. The structure and characteristics of its code suggest that it may have been developed using large language models (LLMs) or automation frameworks. Koske is […]
Read moreSan Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a partnership with Lumu, a cybersecurity company that enables organizations to measure and understand compromise in real time through its Continuous Compromise Assessment model. This integration enhances Wazuh’s SIEM and XDR […]
Read moreSan Jose, California, September 2025 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a partnership with Lumu, a cybersecurity company that enables organizations to measure and understand compromise in real time through its Continuous Compromise Assessment model. This integration enhances Wazuh’s SIEM and XDR […]
Read moreWe are pleased to announce the release of Wazuh 4.13.0, a version that enhances data visibility, threat intelligence, and strengthens platform resilience. Key highlights include the introduction of the IT Hygiene dashboard, which provides users with the ability to centrally view and query IT Hygiene data. This release delivers new Wazuh CDB lists enriched with […]
Read moreWe are pleased to announce the release of Wazuh 4.13.0, a version that enhances data visibility, threat intelligence, and strengthens platform resilience. Key highlights include the introduction of the IT Hygiene dashboard, which provides users with the ability to centrally view and query IT Hygiene data. This release delivers new Wazuh CDB lists enriched with […]
Read moreNetwork security focuses on ensuring the integrity, confidentiality, and availability of computer networks and data by preventing unauthorized access, misuse, or disruption. Continuous network monitoring provides visibility into network activity, enabling organizations to detect issues, optimize performance, and identify potential threats before they escalate into serious incidents. Wazuh is an open source SIEM/XDR platform that […]
Read moreNetwork security focuses on ensuring the integrity, confidentiality, and availability of computer networks and data by preventing unauthorized access, misuse, or disruption. Continuous network monitoring provides visibility into network activity, enabling organizations to detect issues, optimize performance, and identify potential threats before they escalate into serious incidents. Wazuh is an open source SIEM/XDR platform that […]
Read moreSan Jose, California, August 2025 – Wazuh, the leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, today announced a partnership with SmarTech-IT, a cybersecurity solutions provider serving small and medium-sized businesses, healthcare organizations, and local governments across Europe. SmarTech-IT will integrate Wazuh as its core open-source […]
Read moreSan Jose, California, August 2025 – Wazuh, the leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, today announced a partnership with SmarTech-IT, a cybersecurity solutions provider serving small and medium-sized businesses, healthcare organizations, and local governments across Europe. SmarTech-IT will integrate Wazuh as its core open-source […]
Read moreApos, first identified in April 2024, has drawn significant attention in the security community due to its stealthy behavior and layered infection chain. Unlike opportunistic threats that indiscriminately target systems, Apos demonstrates a calculated focus on persistence and evasion. The malware often masquerades as legitimate software components, mimicking processes such as Chrome extension updates to […]
Read moreApos, first identified in April 2024, has drawn significant attention in the security community due to its stealthy behavior and layered infection chain. Unlike opportunistic threats that indiscriminately target systems, Apos demonstrates a calculated focus on persistence and evasion. The malware often masquerades as legitimate software components, mimicking processes such as Chrome extension updates to […]
Read more