Wazuh integration with Amazon Security Lake as a custom source
Amazon Security Lake is a fully managed service that helps organizations aggregate, store, and...
Amazon Security Lake is a fully managed service that helps organizations aggregate, store, and...
San Jose, California, July 2024 – Wazuh, a leader in open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, announces a strategic partnership with ISS Technologies, a leader in delivering comprehensive Cloud and Cyber Security solutions and support services. ISS Technologies has over two decades of expertise in Cloud, Security, […]
Read moreSan Jose, California, July 2024 – Wazuh, a leader in open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, announces a strategic partnership with ISS Technologies, a leader in delivering comprehensive Cloud and Cyber Security solutions and support services. ISS Technologies has over two decades of expertise in Cloud, Security, […]
Read moreRecently, CrowdStrike, a prominent XDR (Extended Detection and Response) provider, encountered a significant technical issue that affected numerous organizations. This article examines the CrowdStrike incident and details how the architecture of Wazuh avoids similar risks. The CrowdStrike incident On July 18, 2024, a Blue Screen of Death (BSOD) issue associated with CrowdStrike’s Falcon sensor update […]
Read moreRecently, CrowdStrike, a prominent XDR (Extended Detection and Response) provider, encountered a significant technical issue that affected numerous organizations. This article examines the CrowdStrike incident and details how the architecture of Wazuh avoids similar risks. The CrowdStrike incident On July 18, 2024, a Blue Screen of Death (BSOD) issue associated with CrowdStrike’s Falcon sensor update […]
Read moreWazuh is an open source security platform that offers Extended Detection and Response (XDR) and Security Information and Event Management (SIEM) capabilities to organizations. It provides security to IT infrastructure through real-time monitoring, threat detection, log analysis, vulnerability detection, and automated incident response. By collecting and analyzing security data from endpoints, Wazuh enables organizations to […]
Read moreWazuh is an open source security platform that offers Extended Detection and Response (XDR) and Security Information and Event Management (SIEM) capabilities to organizations. It provides security to IT infrastructure through real-time monitoring, threat detection, log analysis, vulnerability detection, and automated incident response. By collecting and analyzing security data from endpoints, Wazuh enables organizations to […]
Read moreSecurity alerting enables organizations to promptly detect potential security incidents, allowing for rapid response and risk mitigation. Organizations can immediately prevent breaches, comply with regulatory requirements, and optimize operational efficiency by receiving timely alerts. Automated security alerting streamlines incident response processes, minimizing downtime and optimizing resource usage while demonstrating a commitment to proactive security measures. […]
Read moreSecurity alerting enables organizations to promptly detect potential security incidents, allowing for rapid response and risk mitigation. Organizations can immediately prevent breaches, comply with regulatory requirements, and optimize operational efficiency by receiving timely alerts. Automated security alerting streamlines incident response processes, minimizing downtime and optimizing resource usage while demonstrating a commitment to proactive security measures. […]
Read moreWindows Performance Counter provides an in-depth and consistent interface for collecting different types of system data such as processor, memory, and disk usage statistics. Performance counters can be used to monitor system resources and performance. Windows performance counter data can be viewed in real time with the perfmon utility or alternatively, through the Powershell cmdlet […]
Read moreWindows Performance Counter provides an in-depth and consistent interface for collecting different types of system data such as processor, memory, and disk usage statistics. Performance counters can be used to monitor system resources and performance. Windows performance counter data can be viewed in real time with the perfmon utility or alternatively, through the Powershell cmdlet […]
Read moreDFIR-IRIS is an open source platform for case management and incident response, enabling incident responders to document, track, and analyze security incidents. It supports remote investigations by allowing responders to access and share technical details about incidents, fostering collaboration and coordinated responses to threats. Integrating DFIR-IRIS with the Wazuh XDR and SIEM platform provides a […]
Read moreDFIR-IRIS is an open source platform for case management and incident response, enabling incident responders to document, track, and analyze security incidents. It supports remote investigations by allowing responders to access and share technical details about incidents, fostering collaboration and coordinated responses to threats. Integrating DFIR-IRIS with the Wazuh XDR and SIEM platform provides a […]
Read moreSan Jose, California, July 2024 – Wazuh, a leader in open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, announces a strategic partnership with Seculibrium, a cybersecurity firm specializing in comprehensive security services. Seculibrium delivers cybersecurity solutions that include threat detection, incident response, and compliance management. The partnership with Wazuh […]
Read moreSan Jose, California, July 2024 – Wazuh, a leader in open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, announces a strategic partnership with Seculibrium, a cybersecurity firm specializing in comprehensive security services. Seculibrium delivers cybersecurity solutions that include threat detection, incident response, and compliance management. The partnership with Wazuh […]
Read moreGrype is a lightweight, open source tool for scanning container images and filesystems for vulnerabilities. It examines container image layers and dependencies to identify known vulnerabilities in the software packages installed within the image. By inspecting each layer and its contents, Grype helps you proactively uncover potential security risks before deploying the container image into […]
Read moreGrype is a lightweight, open source tool for scanning container images and filesystems for vulnerabilities. It examines container image layers and dependencies to identify known vulnerabilities in the software packages installed within the image. By inspecting each layer and its contents, Grype helps you proactively uncover potential security risks before deploying the container image into […]
Read moreSan Jose, California, May 2024 – Wazuh, a leader in open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, is pleased to announce a partnership with Arcasafe, an ICT technology company offering a comprehensive ecosystem of cybersecurity solutions and compliance expertise. Arcasafe integrates Wazuh’s platform to deliver advanced cybersecurity services […]
Read moreSan Jose, California, May 2024 – Wazuh, a leader in open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, is pleased to announce a partnership with Arcasafe, an ICT technology company offering a comprehensive ecosystem of cybersecurity solutions and compliance expertise. Arcasafe integrates Wazuh’s platform to deliver advanced cybersecurity services […]
Read moreMongoDB is a non-relational database system known for its flexibility, scalability, and performance. Unlike relational databases that use tables with predefined structures, MongoDB stores data in key, value pairs. MongoDB has features that include high performance, query API, horizontal scalability, and high availability. It is supported by Linux, Windows, and macOS operating systems. Wazuh is […]
Read moreMongoDB is a non-relational database system known for its flexibility, scalability, and performance. Unlike relational databases that use tables with predefined structures, MongoDB stores data in key, value pairs. MongoDB has features that include high performance, query API, horizontal scalability, and high availability. It is supported by Linux, Windows, and macOS operating systems. Wazuh is […]
Read moreCredential access attacks are cyber attacks that aim to obtain users’ login credentials. These credentials can include usernames, passwords, security tokens, or other authentication information. They remain one of the critical security threats for organizations. It enables adversaries to gain unauthorized access to systems, facilitating lateral movement and privilege escalation within the targeted environment. This […]
Read moreCredential access attacks are cyber attacks that aim to obtain users’ login credentials. These credentials can include usernames, passwords, security tokens, or other authentication information. They remain one of the critical security threats for organizations. It enables adversaries to gain unauthorized access to systems, facilitating lateral movement and privilege escalation within the targeted environment. This […]
Read moreWe are thrilled to announce the release of Wazuh 4.8.0. This update introduces a rework of the Wazuh Vulnerability Detector module and improvements to the Wazuh dashboard user interface (UI) and user experience (UX). It includes updates to the VirusTotal integration and the MITRE ATT&CK database among others. Key highlights Redesigned Vulnerability Detector module The […]
Read moreWe are thrilled to announce the release of Wazuh 4.8.0. This update introduces a rework of the Wazuh Vulnerability Detector module and improvements to the Wazuh dashboard user interface (UI) and user experience (UX). It includes updates to the VirusTotal integration and the MITRE ATT&CK database among others. Key highlights Redesigned Vulnerability Detector module The […]
Read moreWazuh multi-site implementation offers a solution that helps organizations unify their security monitoring capabilities across multiple geographically dispersed locations or sites. This implementation focuses on having Wazuh cluster components that collect, process, and store logs from the Wazuh agents within each site. A single Wazuh dashboard displays security alerts generated from events occurring in monitored […]
Read moreWazuh multi-site implementation offers a solution that helps organizations unify their security monitoring capabilities across multiple geographically dispersed locations or sites. This implementation focuses on having Wazuh cluster components that collect, process, and store logs from the Wazuh agents within each site. A single Wazuh dashboard displays security alerts generated from events occurring in monitored […]
Read more