Wazuh and Protect7 Announce Partnership to Reinforce Cybersecurity Services in Switzerland
/ News

Wazuh and Protect7 Announce Partnership to Reinforce Cybersecurity Services in Switzerland

Post icon
Detecting DNS spoofing attacks with Wazuh

Detecting DNS spoofing attacks with Wazuh

Post icon
/ Engineering
By

DNS spoofing involves forging DNS responses to redirect traffic to malicious IP addresses, often through cache poisoning, Man-in-the-Middle (MITM) attacks, or local file tampering. Detecting DNS spoofing involves monitoring for unauthorized DNS record changes, unexpected IP address redirections, and SSL/TLS certificate warnings. Key detection methods include utilizing DNSSEC to verify data authenticity, analyzing traffic, and […]

Read more
Wazuh integration with Shuffle

Wazuh integration with Shuffle

Post icon
/ Engineering
By

Security automation refers to the use of technology to automatically handle security tasks, processes, and workflows with minimal human intervention. These tasks include detecting threats, triaging alerts, responding to incidents, remediating vulnerabilities, and more. Automating repetitive and time-consuming tasks allows security teams to reduce response times, minimize human error, and focus on more complex strategic […]

Read more
Detecting Kubernetes attacks with Wazuh

Detecting Kubernetes attacks with Wazuh

Post icon
/ Engineering
By

Kubernetes is an open source container orchestration platform that manages applications through a centralized API-driven control plane. Most operations in a Kubernetes cluster are performed via the Kubernetes API and are typically governed by RBAC or other authorization mechanisms. Misconfigured permissions or exposed credentials can allow attackers to interact directly with the Kubernetes API server. […]

Read more
Wazuh and PT Media Telekomunikasi Mandiri Announce Partnership to Deliver Network Infrastructure Solutions

Wazuh and PT Media Telekomunikasi Mandiri Announce Partnership to Deliver Network Infrastructure Solutions

Post icon
/ News
By

San Jose, California, April 2026 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a partnership with PT Media Telekomunikasi Mandiri, which began in March 2026, to deliver tailored IT network infrastructure solutions. Through this partnership, PT Media Telekomunikasi Mandiri will leverage Wazuh as the […]

Read more
Wazuh and Quer System Announce Partnership to Strengthen SOC Services

Wazuh and Quer System Announce Partnership to Strengthen SOC Services

Post icon
/ News
By

San Jose, California, March 2026 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a partnership with Quer System, specialists in enhancing Open Source solutions through partnerships and successful project implementation. Through this partnership, Quer System strengthens its cybersecurity capabilities as part of its professional […]

Read more
Detecting Kubernetes misconfigurations with KubeLinter and Wazuh

Detecting Kubernetes misconfigurations with KubeLinter and Wazuh

Post icon
/ Engineering
By

Kubernetes misconfigurations introduce security risks in containerized environments. Containers running in privileged mode, workloads without CPU or memory limits, and workloads that run as root are common mistakes that can lead to privilege escalation, node compromise, or denial-of-service conditions. These issues are often introduced during development and remain undetected until deployment, making early detection important. […]

Read more
CSIR and Wazuh Strengthen Cybersecurity in South Africa

CSIR and Wazuh Strengthen Cybersecurity in South Africa

Post icon
/ News
By

San José, California, April 2026 - Wazuh, an open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, has announced that it is entering into a partnership with the Council for Scientific and Industrial Research (CSIR), a multidisciplinary research and technology organisation in South Africa.

Read more
Detecting and responding to BQTLock ransomware with Wazuh

Detecting and responding to BQTLock ransomware with Wazuh

Post icon
/ Engineering
By

BQTLock is a .NET-based ransomware that targets Windows environments and employs a hybrid encryption approach combining AES-256 and RSA-4096, marking encrypted files with .bqtlock extension. It operates under a Ransomware‑as‑a‑Service (RaaS) model, which lowers the barrier to entry for attackers and accelerates its spread across industries. BQTLock operators typically favor targeted intrusions over random infections, […]

Read more
Automating Linux endpoint hardening with Wazuh

Automating Linux endpoint hardening with Wazuh

Post icon
/ Engineering
By

Endpoint hardening is a continuous process for securing modern IT environments against vulnerabilities and misconfigurations. It reduces the attack surface of endpoints and strengthens defenses against cyber threats by enforcing standardized security configurations. Organizations typically rely on established guidelines and frameworks, such as the Center for Internet Security (CIS) Benchmarks and NIST, for hardening. These […]

Read more
Wazuh and Lechner Announce Partnership to Spread Tech Support in Chile

Wazuh and Lechner Announce Partnership to Spread Tech Support in Chile

Post icon
/ News
By

San Jose, California, February 2026 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a partnership with Lechner, a Chilean provider which helps companies operate with reliable, secure, and always-available technology. Through this partnership, Lechner uses Wazuh as the central detection and response platform within […]

Read more
Detecting phishing attacks with Wazuh and Shuffle

Detecting phishing attacks with Wazuh and Shuffle

Post icon
/ Engineering
By

Phishing remains one of the most common social engineering attack techniques, often serving as the initial foothold for ransomware or data exfiltration. Threat actors exploit human trust through deceptive emails to bypass traditional perimeter defences and harvest sensitive data or deliver malicious payloads. As a result, organizations require mechanisms to detect and automatically respond to […]

Read more
Wazuh and Protecya Announce Partnership to Deliver SOC Services in Africa

Wazuh and Protecya Announce Partnership to Deliver SOC Services in Africa

Post icon
/ News
By

San Jose, California, March 2026 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solution, announced a partnership with Protecya, a provider of SOC services, empowering governments and enterprises across Africa. Through this strategic partnership, Protecya will integrate Wazuh into its Security Operations Center (SOC) service portfolio. […]

Read more
Monitoring HashiCorp Vault activities with Wazuh

Monitoring HashiCorp Vault activities with Wazuh

Post icon
/ Engineering
By

Managing secrets in a distributed environment remains a significant challenge for many organizations. HashiCorp Vault (Vault) serves as a centralized system for storing and managing sensitive data such as API keys, tokens, passwords, and certificates. While centralization simplifies administration and access control, misconfigurations or unauthorized access can quickly lead to compromise and data loss. Therefore, […]

Read more
Keep up to date
with our digest of articles