Recently, a zero-day vulnerability dubbed Log4Shell with CVE-2021-44228 was detected in Apache’s Log4J 2 that allows malicious actors to launch RCE attacks. Learn how Wazuh can help with the monitoring [...]
Detecting vulnerable software on these systems is a challenge, since it requires correlation of data pulled from NVD [...]
Monitoring GKE audit logs on your Kubernetes infrastructure is vital for improving your security posture, for detecting possible intrusions, and more
Wazuh integrates with the Elastic Stack. In this post you will learn how to create snapshots using Elasticsearch in order to back up your Wazuh indices.
Emotet is a malware mainly used to steal sensitive and private information. Learn how to use Wazuh to detect the stages of Emotet malware.
Wazuh introduced the Fluentd module, which allows the forwarding of information to a Fluentd server. Gain more security visibility on your system today.
We are going to attack a vulnerable server using Metasploit and then we will see how to use Wazuh to detect various of its attacks. This framework is the most [...]
This blog post will focus on automatically executing YARA scans by using the active response module when a Wazuh FIM alert triggers.
Learn how to monitor the data stored in your S3 with Amazon Macie and Wazuh.
Learn how to keep track of changes made to your AWS resources and monitor user activity with AWS CloudTrail and Wazuh.
Using the National Vulnerability Database, Wazuh can detect vulnerabilities on Windows hosts by looking at their installed software [...]
Wazuh provides an out-of-the-box set of rules used for threat detection and response. This ruleset is continuously updated [...]