Wazuh has signed a partnership agreement [...]
We are thrilled to announce our SOC 2 Type 2 Compliance & Certification as part of our ongoing [...]
Detecting vulnerable software on these systems is a challenge, since it requires correlation of data pulled from NVD [...]
We are glad to announce that Wazuh 4.0.0 is released. Discover the new additions and improvements here! Wazuh is now better than ever.
Monitoring GKE audit logs on your Kubernetes infrastructure is vital for improving your security posture, for detecting possible intrusions, and more
Wazuh integrates with the Elastic Stack. In this post you will learn how to create snapshots using Elasticsearch in order to back up your Wazuh indices.
Emotet is a malware mainly used to steal sensitive and private information. Learn how to use Wazuh to detect the stages of Emotet malware.
Wazuh introduced the Fluentd module, which allows the forwarding of information to a Fluentd server. Gain more security visibility on your system today.
We are going to attack a vulnerable server using Metasploit and then we will see how to use Wazuh to detect various of its attacks. This framework is the most [...]
This blog post will focus on automatically executing YARA scans by using the active response module when a Wazuh FIM alert triggers.