Enhancing threat intelligence with Wazuh and Criminal IP integration
Criminal IP is a threat intelligence platform that provides insights into IP addresses, domains, and other network...
Criminal IP is a threat intelligence platform that provides insights into IP addresses, domains, and other network...
Razr is a highly destructive ransomware that compromises systems by encrypting files, effectively rendering them inaccessible to users. This ransomware commonly propagates through phishing emails containing malicious attachments or by exploiting vulnerabilities in software and operating systems. Once infected, the Razr ransomware scans for valuable data, including documents, images, and databases. It activates its payload […]
Read moreRazr is a highly destructive ransomware that compromises systems by encrypting files, effectively rendering them inaccessible to users. This ransomware commonly propagates through phishing emails containing malicious attachments or by exploiting vulnerabilities in software and operating systems. Once infected, the Razr ransomware scans for valuable data, including documents, images, and databases. It activates its payload […]
Read moreSan Jose, California, January 2025 – Wazuh, a leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, has partnered with Grupo Intelector, a cybersecurity company with 25 years of experience and a leader in support and customer service throughout Latin America. This collaboration enables Grupo Intelector to […]
Read moreSan Jose, California, January 2025 – Wazuh, a leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, has partnered with Grupo Intelector, a cybersecurity company with 25 years of experience and a leader in support and customer service throughout Latin America. This collaboration enables Grupo Intelector to […]
Read moreWe are excited to announce the release of Wazuh 4.10.0. This release introduces integration with Microsoft Intune, enhanced logging for cloud integration modules, and debug symbol generation for macOS, Linux, and Windows. It includes a new vulnerability evaluation status field and major updates to SCA policies for improved security compliance on monitored endpoints. We also […]
Read moreWe are excited to announce the release of Wazuh 4.10.0. This release introduces integration with Microsoft Intune, enhanced logging for cloud integration modules, and debug symbol generation for macOS, Linux, and Windows. It includes a new vulnerability evaluation status field and major updates to SCA policies for improved security compliance on monitored endpoints. We also […]
Read moreA Large Language Model (LLM) is an Artificial Intelligence (AI) program that recognizes, processes, and generates human-like texts. Claude Haiku is an LLM model designed by Antropic that can perform code completion, interactive chatbots, and content moderation tasks. The Claude Haiku model can be integrated as a chatbox feature in the Wazuh dashboard. Performing this […]
Read moreA Large Language Model (LLM) is an Artificial Intelligence (AI) program that recognizes, processes, and generates human-like texts. Claude Haiku is an LLM model designed by Antropic that can perform code completion, interactive chatbots, and content moderation tasks. The Claude Haiku model can be integrated as a chatbox feature in the Wazuh dashboard. Performing this […]
Read moreSan Jose, California, November 2024 – Wazuh, a leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, has partnered with Foliateam, a French company specializing in cybersecurity, IT infrastructures, and Unified Communications as a Service (UCaaS) applications. The partnership enhances Foliateam’s Security Operations Center (SOC) capabilities, enabling […]
Read moreSan Jose, California, November 2024 – Wazuh, a leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, has partnered with Foliateam, a French company specializing in cybersecurity, IT infrastructures, and Unified Communications as a Service (UCaaS) applications. The partnership enhances Foliateam’s Security Operations Center (SOC) capabilities, enabling […]
Read moreDevSecOps, which stands for Development, Security, and Operations, is a methodology that integrates security practices into the software development lifecycle. It emphasizes integrating security into every phase of the software development lifecycle rather than treating it as a separate or final step. By embedding security checks early, DevSecOps detects vulnerabilities sooner. Integrating security into Continuous […]
Read moreDevSecOps, which stands for Development, Security, and Operations, is a methodology that integrates security practices into the software development lifecycle. It emphasizes integrating security into every phase of the software development lifecycle rather than treating it as a separate or final step. By embedding security checks early, DevSecOps detects vulnerabilities sooner. Integrating security into Continuous […]
Read moreSan Jose, California, November 2024 – Wazuh, a leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, announces its partnership with Pandigital SRL, a cybersecurity company specializing in vulnerability assessment, penetration testing, and Security Operations Center (SOC) services. Pandigital uses Wazuh’s SIEM platform as a core component […]
Read moreSan Jose, California, November 2024 – Wazuh, a leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, announces its partnership with Pandigital SRL, a cybersecurity company specializing in vulnerability assessment, penetration testing, and Security Operations Center (SOC) services. Pandigital uses Wazuh’s SIEM platform as a core component […]
Read moreDeerStealer is a Windows-based stealer malware designed to steal sensitive user information, including login credentials, web browser data, and cryptocurrency wallet contents. It has similarities with other stealer malware like XFiles and Lummar. It is commonly spread through phishing emails and malvertising campaigns that appear trustworthy like the Google Authenticator incident. Upon infecting a system, […]
Read moreDeerStealer is a Windows-based stealer malware designed to steal sensitive user information, including login credentials, web browser data, and cryptocurrency wallet contents. It has similarities with other stealer malware like XFiles and Lummar. It is commonly spread through phishing emails and malvertising campaigns that appear trustworthy like the Google Authenticator incident. Upon infecting a system, […]
Read moreSan Jose, California, November 2024 – Wazuh, a leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, has partnered with Digital Hand Made, a technology company specializing in network services and cybersecurity solutions. With more than 20 years of experience, Digital Hand Made is a trusted provider […]
Read moreSan Jose, California, November 2024 – Wazuh, a leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, has partnered with Digital Hand Made, a technology company specializing in network services and cybersecurity solutions. With more than 20 years of experience, Digital Hand Made is a trusted provider […]
Read moreBLX stealer, also known as XLABB Stealer is a malware designed to steal sensitive information like credentials, payment data, and cryptocurrency wallets from infected endpoints. It uses advanced evasion techniques, process injection, and file encryption to bypass traditional security tools, making it a serious threat to individuals and organizations. BLX Stealer is actively promoted on […]
Read moreBLX stealer, also known as XLABB Stealer is a malware designed to steal sensitive information like credentials, payment data, and cryptocurrency wallets from infected endpoints. It uses advanced evasion techniques, process injection, and file encryption to bypass traditional security tools, making it a serious threat to individuals and organizations. BLX Stealer is actively promoted on […]
Read moreUser mode and kernel mode are two operating states within a computer system that define different levels of access and control to the hardware resources of a computer. Choosing the right mode between the two is important, as it affects the security and stability of the computer. User mode is a restricted operating environment where […]
Read moreUser mode and kernel mode are two operating states within a computer system that define different levels of access and control to the hardware resources of a computer. Choosing the right mode between the two is important, as it affects the security and stability of the computer. User mode is a restricted operating environment where […]
Read moreSnake keylogger, also known as “404 Keylogger” or “KrakenKeylogger” is a .NET-based trojan designed to target Windows endpoints and steal sensitive information. It is typically spread through phishing campaigns and can exfiltrate saved credentials from web browsers, email clients, and other commonly used applications. In addition, it can capture keystrokes, screenshots, and data from the […]
Read moreSnake keylogger, also known as “404 Keylogger” or “KrakenKeylogger” is a .NET-based trojan designed to target Windows endpoints and steal sensitive information. It is typically spread through phishing campaigns and can exfiltrate saved credentials from web browsers, email clients, and other commonly used applications. In addition, it can capture keystrokes, screenshots, and data from the […]
Read morePowerShell is a tool widely used for managing Windows endpoints. Its versatility makes it a key resource for administrators, allowing them to control various system functions, automate workflows, and manage configurations efficiently. The scripting capabilities of PowerShell enable users to perform tasks that would otherwise require multiple steps manually, saving time and reducing human error. […]
Read morePowerShell is a tool widely used for managing Windows endpoints. Its versatility makes it a key resource for administrators, allowing them to control various system functions, automate workflows, and manage configurations efficiently. The scripting capabilities of PowerShell enable users to perform tasks that would otherwise require multiple steps manually, saving time and reducing human error. […]
Read more