Emotet is a malware originally designed as a trojan, and mainly used to steal sensitive and private information. It has the ability to spread to other connected computers and even [...]
Fluentd is an open source data collector for semi and un-structured data sets. It can analyze and send information to various tools for either alerting, analysis or archiving. The main [...]
Metasploit is the most used penetration testing framework in the world. It contains a suite of tools that you can use to test security vulnerabilities, enumerate networks, execute attacks, and [...]
Wazuh can integrate with YARA in different ways. This blogpost will focus on automatically executing YARA scans by using the active response module when a Wazuh FIM alert triggers.
Learn how to monitor the data stored in your S3 with Amazon Macie and Wazuh.
Learn how to keep track of changes made to your AWS resources and monitor user activity with AWS CloudTrail and Wazuh.
In 2019, more than 700 vulnerabilities were discovered in Microsoft operating systems. As soon as they are in [...]
Wazuh provides an out-of-the-box set of rules used for threat detection and response. This ruleset is continuously updated [...]
In this post we will make the necessary steps to deploy a Wazuh cluster with [...]
In Windows systems, a Group Policy Object (GPO for short) is a feature that allows an administrator to tune the operating system’s settings and they’re widely used in Active Directory [...]