Wazuh integration with Amazon Security Lake as a custom source

Wazuh integration with Amazon Security Lake as a custom source

Post icon
/ Engineering
By

Amazon Security Lake is a fully managed service that helps organizations aggregate, store, and analyze security data from various sources, such as AWS services, on-premise logs, and third-party SaaS applications. Security administrators can use AWS services like Athena to query the security data, which gives them insight into potential threats and vulnerabilities across an organization’s […]

Read more
Post icon
/ Engineering

Wazuh integration with Amazon Security Lake as a custom source

By

Amazon Security Lake is a fully managed service that helps organizations aggregate, store, and analyze security data from various sources, such as AWS services, on-premise logs, and third-party SaaS applications. Security administrators can use AWS services like Athena to query the security data, which gives them insight into potential threats and vulnerabilities across an organization’s […]

Read more
Deploying Wazuh agents using ManageEngine

Deploying Wazuh agents using ManageEngine

Post icon
/ Engineering
By

Wazuh is an open source security platform that offers Extended Detection and Response (XDR) and Security Information and Event Management (SIEM) capabilities to organizations. It provides security to IT infrastructure through real-time monitoring, threat detection, log analysis, vulnerability detection, and automated incident response. By collecting and analyzing security data from endpoints, Wazuh enables organizations to […]

Read more
Post icon
/ Engineering

Deploying Wazuh agents using ManageEngine

By

Wazuh is an open source security platform that offers Extended Detection and Response (XDR) and Security Information and Event Management (SIEM) capabilities to organizations. It provides security to IT infrastructure through real-time monitoring, threat detection, log analysis, vulnerability detection, and automated incident response. By collecting and analyzing security data from endpoints, Wazuh enables organizations to […]

Read more
Exploring security alerting options for improved threat detection in Wazuh – Part 1

Exploring security alerting options for improved threat detection in Wazuh – Part 1

Post icon
/ Engineering
By

Security alerting enables organizations to promptly detect potential security incidents, allowing for rapid response and risk mitigation. Organizations can immediately prevent breaches, comply with regulatory requirements, and optimize operational efficiency by receiving timely alerts. Automated security alerting streamlines incident response processes, minimizing downtime and optimizing resource usage while demonstrating a commitment to proactive security measures. […]

Read more
Post icon
/ Engineering

Exploring security alerting options for improved threat detection in Wazuh – Part 1

By

Security alerting enables organizations to promptly detect potential security incidents, allowing for rapid response and risk mitigation. Organizations can immediately prevent breaches, comply with regulatory requirements, and optimize operational efficiency by receiving timely alerts. Automated security alerting streamlines incident response processes, minimizing downtime and optimizing resource usage while demonstrating a commitment to proactive security measures. […]

Read more
Monitoring Windows resources with Performance Counters

Monitoring Windows resources with Performance Counters

Post icon
/ Engineering
By and

Windows Performance Counter provides an in-depth and consistent interface for collecting different types of system data such as processor, memory, and disk usage statistics. Performance counters can be used to monitor system resources and performance. Windows performance counter data can be viewed in real time with the perfmon utility or alternatively, through the Powershell cmdlet […]

Read more
Post icon
/ Engineering

Monitoring Windows resources with Performance Counters

By and

Windows Performance Counter provides an in-depth and consistent interface for collecting different types of system data such as processor, memory, and disk usage statistics. Performance counters can be used to monitor system resources and performance. Windows performance counter data can be viewed in real time with the perfmon utility or alternatively, through the Powershell cmdlet […]

Read more
Enhancing incident response with Wazuh and DFIR-IRIS integration

Enhancing incident response with Wazuh and DFIR-IRIS integration

Post icon
/ Engineering
By and

DFIR-IRIS is an open source platform for case management and incident response, enabling incident responders to document, track, and analyze security incidents. It supports remote investigations by allowing responders to access and share technical details about incidents, fostering collaboration and coordinated responses to threats. Integrating DFIR-IRIS with the Wazuh XDR and SIEM platform provides a […]

Read more
Post icon
/ Engineering

Enhancing incident response with Wazuh and DFIR-IRIS integration

By and

DFIR-IRIS is an open source platform for case management and incident response, enabling incident responders to document, track, and analyze security incidents. It supports remote investigations by allowing responders to access and share technical details about incidents, fostering collaboration and coordinated responses to threats. Integrating DFIR-IRIS with the Wazuh XDR and SIEM platform provides a […]

Read more
Streamlining container image security with Grype and Wazuh

Streamlining container image security with Grype and Wazuh

Post icon
/ Engineering
By

Grype is a lightweight, open source tool for scanning container images and filesystems for vulnerabilities. It examines container image layers and dependencies to identify known vulnerabilities in the software packages installed within the image. By inspecting each layer and its contents, Grype helps you proactively uncover potential security risks before deploying the container image into […]

Read more
Post icon
/ Engineering

Streamlining container image security with Grype and Wazuh

By

Grype is a lightweight, open source tool for scanning container images and filesystems for vulnerabilities. It examines container image layers and dependencies to identify known vulnerabilities in the software packages installed within the image. By inspecting each layer and its contents, Grype helps you proactively uncover potential security risks before deploying the container image into […]

Read more
Monitoring MongoDB database using Wazuh

Monitoring MongoDB database using Wazuh

Post icon
/ Engineering
By

MongoDB is a non-relational database system known for its flexibility, scalability, and performance. Unlike relational databases that use tables with predefined structures, MongoDB stores data in key, value pairs. MongoDB has features that include high performance, query API, horizontal scalability, and high availability. It is supported by Linux, Windows, and macOS operating systems.  Wazuh is […]

Read more
Post icon
/ Engineering

Monitoring MongoDB database using Wazuh

By

MongoDB is a non-relational database system known for its flexibility, scalability, and performance. Unlike relational databases that use tables with predefined structures, MongoDB stores data in key, value pairs. MongoDB has features that include high performance, query API, horizontal scalability, and high availability. It is supported by Linux, Windows, and macOS operating systems.  Wazuh is […]

Read more
Hunting for Linux credential access attacks with Wazuh

Hunting for Linux credential access attacks with Wazuh

Post icon
/ Engineering
By

Credential access attacks are cyber attacks that aim to obtain users’ login credentials. These credentials can include usernames, passwords, security tokens, or other authentication information. They remain one of the critical security threats for organizations. It enables adversaries to gain unauthorized access to systems, facilitating lateral movement and privilege escalation within the targeted environment. This […]

Read more
Post icon
/ Engineering

Hunting for Linux credential access attacks with Wazuh

By

Credential access attacks are cyber attacks that aim to obtain users’ login credentials. These credentials can include usernames, passwords, security tokens, or other authentication information. They remain one of the critical security threats for organizations. It enables adversaries to gain unauthorized access to systems, facilitating lateral movement and privilege escalation within the targeted environment. This […]

Read more
Wazuh multi-site implementation

Wazuh multi-site implementation

Post icon
/ Engineering
By

Wazuh multi-site implementation offers a solution that helps organizations unify their security monitoring capabilities across multiple geographically dispersed locations or sites. This implementation focuses on having Wazuh cluster components that collect, process, and store logs from the Wazuh agents within each site. A single Wazuh dashboard displays security alerts generated from events occurring in monitored […]

Read more
Post icon
/ Engineering

Wazuh multi-site implementation

By

Wazuh multi-site implementation offers a solution that helps organizations unify their security monitoring capabilities across multiple geographically dispersed locations or sites. This implementation focuses on having Wazuh cluster components that collect, process, and store logs from the Wazuh agents within each site. A single Wazuh dashboard displays security alerts generated from events occurring in monitored […]

Read more
Load balancing a Wazuh server cluster using NGINX

Load balancing a Wazuh server cluster using NGINX

Post icon
/ Engineering
By and

In this blog post, we demonstrate how to configure an NGINX network load balancer using the hash algorithm.

Read more
Post icon
/ Engineering

Load balancing a Wazuh server cluster using NGINX

By and

In this blog post, we demonstrate how to configure an NGINX network load balancer using the hash algorithm.

Read more
CHAVECLOAK malware detection and response with Wazuh

CHAVECLOAK malware detection and response with Wazuh

Post icon
/ Engineering
By

CHAVECLOAK malware is a Windows-based banking trojan that targets South American financial sector individuals to steal sensitive financial information. The malware is distributed through phishing emails with embedded malicious PDF attachments. CHAVECLOAK blocks user device screens, logs keystrokes, and shows fake pop-up windows. The malware monitors the victim’s endpoint and becomes active when it detects […]

Read more
Post icon
/ Engineering

CHAVECLOAK malware detection and response with Wazuh

By

CHAVECLOAK malware is a Windows-based banking trojan that targets South American financial sector individuals to steal sensitive financial information. The malware is distributed through phishing emails with embedded malicious PDF attachments. CHAVECLOAK blocks user device screens, logs keystrokes, and shows fake pop-up windows. The malware monitors the victim’s endpoint and becomes active when it detects […]

Read more
Detecting exploitation of XZ Utils vulnerability (CVE-2024-3094) with Wazuh

Detecting exploitation of XZ Utils vulnerability (CVE-2024-3094) with Wazuh

Post icon
/ Engineering
By

In March 2024, a backdoor was detected within XZ Utils, earning the designation CVE-2024-3094. The vulnerability has a CVSS score of 10, indicating its potential for critical impact if exploited. The vulnerability affects XZ versions 5.6.0 and 5.6.1 and presents a serious threat to endpoints that run Unix-like operating systems.  Previously, we detailed how to […]

Read more
Post icon
/ Engineering

Detecting exploitation of XZ Utils vulnerability (CVE-2024-3094) with Wazuh

By

In March 2024, a backdoor was detected within XZ Utils, earning the designation CVE-2024-3094. The vulnerability has a CVSS score of 10, indicating its potential for critical impact if exploited. The vulnerability affects XZ versions 5.6.0 and 5.6.1 and presents a serious threat to endpoints that run Unix-like operating systems.  Previously, we detailed how to […]

Read more
Keep up to date
with our digest of articles