We are going to attack a vulnerable server using Metasploit and then we will see how to use Wazuh to detect various of its attacks. This framework is the most [...]
Wazuh Cloud platform has been validated as PCI DSS Level 1 Service Provider compliant. Our [...]
Learn how to use the file integrity monitoring module to prevent and detect ransomware. Keep your system safe [...]
Wazuh agents move through all the stages of their life cycle, sometimes leaving agents permanently disconnected. Learn how to purge these kinds of agents.
Today we are pleased to announce the release of Wazuh v2.1.0. We have added new features and fixed several bugs. You can find all the details in our release notes and [...]
Today's post is about using Open [...]
In this post, we will discuss how to blocking attacks using the active response feature in OSSEC. In this example, we simulate an SSH Brute Force attack.
We will learn how to updating the ruleset automatically. The ruleset is one of the most important parts of OSSEC and there are two ways to updating it.