Detecting and blocking Cacti remote code execution vulnerability (CVE-2022-46169) with Wazuh

Detecting and blocking Cacti remote code execution vulnerability (CVE-2022-46169) with Wazuh

Post icon
/ Engineering

By

In this blog post, we demonstrated how to detect the Cacti CVE-2022-46169 vulnerability and block exploitation attempts with Wazuh.

Read more
Post icon
/ Engineering

Detecting and blocking Cacti remote code execution vulnerability (CVE-2022-46169) with Wazuh

By

In this blog post, we demonstrated how to detect the Cacti CVE-2022-46169 vulnerability and block exploitation attempts with Wazuh.

Read more
Monitoring USB drives in Windows using Wazuh

Monitoring USB drives in Windows using Wazuh

Post icon
/ Engineering

By

Our new blog post shows how Wazuh can help organizations to monitor USB drives plugged into monitored Windows endpoints in real-time

Read more
Post icon
/ Engineering

Monitoring USB drives in Windows using Wazuh

By

Our new blog post shows how Wazuh can help organizations to monitor USB drives plugged into monitored Windows endpoints in...

Read more
Detecting common Linux persistence techniques with Wazuh

Detecting common Linux persistence techniques with Wazuh

Post icon
/ Engineering

By

Our new blog post shows how to detect common Linux persistence techniques with Wazuh by covering several common techniques.

Read more
Post icon
/ Engineering

Detecting common Linux persistence techniques with Wazuh

By

Our new blog post shows how to detect common Linux persistence techniques with Wazuh by covering several common techniques.

Read more
Diazero and Wazuh sign a partnership agreement

Diazero and Wazuh sign a partnership agreement

Post icon
/ News

By

Wazuh has signed a partnership agreement with Diazero, a company in the technology industry focused on digital security.

Read more
Post icon
/ News

Diazero and Wazuh sign a partnership agreement

By

Wazuh has signed a partnership agreement with Diazero, a company in the technology industry focused on digital security.

Read more
How to detect RedLine Infostealer with Wazuh

How to detect RedLine Infostealer with Wazuh

Post icon
/ Engineering

By

In this blog post, we use Sysmon integration and the Wazuh security configuration assessment module to detect RedLine infostealer.

Read more
Post icon
/ Engineering

How to detect RedLine Infostealer with Wazuh

By

In this blog post, we use Sysmon integration and the Wazuh security configuration assessment module to detect RedLine infostealer.

Read more
Adversary emulation on AWS with Stratus Red Team and Wazuh

Adversary emulation on AWS with Stratus Red Team and Wazuh

Post icon
/ Engineering

By

In our new blog post, we focus on adversary emulation on AWS with Stratus Red Team and using Wazuh security capabilities.

Read more
Post icon
/ Engineering

Adversary emulation on AWS with Stratus Red Team and Wazuh

By

In our new blog post, we focus on adversary emulation on AWS with Stratus Red Team and using Wazuh security...

Read more
How to detect Active Directory attacks with Wazuh [Part 2 of 2]

How to detect Active Directory attacks with Wazuh [Part 2 of 2]

Post icon
/ Engineering

By

In this blog post, we continue showing how Wazuh can detect some common Active Directory attacks using Windows security logs.

Read more
Post icon
/ Engineering

How to detect Active Directory attacks with Wazuh [Part 2 of 2]

By

In this blog post, we continue showing how Wazuh can detect some common Active Directory attacks using Windows security logs.

Read more
Monitoring remote OpenVPN connections with GeoIP and Wazuh XDR

Monitoring remote OpenVPN connections with GeoIP and Wazuh XDR

Post icon
/ Engineering

By

The global pandemic in 2020 gave rise to more companies adopting remote working tools, services, and collaboration solutions. But organizations that utilize remote work services...

Read more
Post icon
/ Engineering

Monitoring remote OpenVPN connections with GeoIP and Wazuh XDR

By

The global pandemic in 2020 gave rise to more companies adopting remote working tools, services, and collaboration solutions. But organizations...

Read more
How to detect Active Directory attacks with Wazuh [Part 1 of 2]

How to detect Active Directory attacks with Wazuh [Part 1 of 2]

Post icon
/ Engineering

By

This blog shows how Wazuh can detect some common Active Directory attacks using Windows security logs and events captured on Sysmon.

Read more
Post icon
/ Engineering

How to detect Active Directory attacks with Wazuh [Part 1 of 2]

By

This blog shows how Wazuh can detect some common Active Directory attacks using Windows security logs and events captured on...

Read more
Detecting hoaxshell with Wazuh

Detecting hoaxshell with Wazuh

Post icon
/ Engineering

By and

Our new blog post shows how Wazuh can detect generic and obfuscated hoaxshell payloads and other attacks that abuse PowerShell.

Read more
Post icon
/ Engineering

Detecting hoaxshell with Wazuh

By and

Our new blog post shows how Wazuh can detect generic and obfuscated hoaxshell payloads and other attacks that abuse PowerShell.

Read more

Keep up to date with
our digest of articles