Detecting BlackCat ransomware with Wazuh
In this blog post, we successfully demonstrated the capability of Wazuh to detect and remove BlackCat ransomware on a Windows endpoint.
In this blog post, we successfully demonstrated the capability of Wazuh to detect and remove BlackCat ransomware on a Windows endpoint.
By Farouk Musa
In this blog post, we demonstrated how to detect the Cacti CVE-2022-46169 vulnerability and block exploitation attempts with Wazuh.
Read moreBy Farouk Musa
In this blog post, we demonstrated how to detect the Cacti CVE-2022-46169 vulnerability and block exploitation attempts with Wazuh.
Read moreOur new blog post shows how we successfully use Wazuh to detect Vidar infostealer on an infected Windows endpoint.
Read moreOur new blog post shows how we successfully use Wazuh to detect Vidar infostealer on an infected Windows endpoint.
Read moreOur new blog post shows how Wazuh can help organizations to monitor USB drives plugged into monitored Windows endpoints in real-time
Read moreOur new blog post shows how Wazuh can help organizations to monitor USB drives plugged into monitored Windows endpoints in...
Read moreOur new blog post shows how to detect common Linux persistence techniques with Wazuh by covering several common techniques.
Read moreOur new blog post shows how to detect common Linux persistence techniques with Wazuh by covering several common techniques.
Read moreIn this blog post, we use Sysmon integration and the Wazuh security configuration assessment module to detect RedLine infostealer.
Read moreIn this blog post, we use Sysmon integration and the Wazuh security configuration assessment module to detect RedLine infostealer.
Read moreIn our new blog post, we focus on adversary emulation on AWS with Stratus Red Team and using Wazuh security capabilities.
Read moreIn our new blog post, we focus on adversary emulation on AWS with Stratus Red Team and using Wazuh security...
Read moreIn this blog post, we continue showing how Wazuh can detect some common Active Directory attacks using Windows security logs.
Read moreIn this blog post, we continue showing how Wazuh can detect some common Active Directory attacks using Windows security logs.
Read moreThe global pandemic in 2020 gave rise to more companies adopting remote working tools, services, and collaboration solutions. But organizations that utilize remote work services...
Read moreThe global pandemic in 2020 gave rise to more companies adopting remote working tools, services, and collaboration solutions. But organizations...
Read moreThis blog shows how Wazuh can detect some common Active Directory attacks using Windows security logs and events captured on Sysmon.
Read moreThis blog shows how Wazuh can detect some common Active Directory attacks using Windows security logs and events captured on...
Read moreBy Openime Oniagbi and Dario Menten
Our new blog post shows how Wazuh can detect generic and obfuscated hoaxshell payloads and other attacks that abuse PowerShell.
Read moreBy Openime Oniagbi and Dario Menten
Our new blog post shows how Wazuh can detect generic and obfuscated hoaxshell payloads and other attacks that abuse PowerShell.
Read more