Discover Linux software vulnerabilities with Wazuh. Detecting vulnerable software on these systems is a challenge, since it requires [...]
Monitoring GKE audit logs on your Kubernetes infrastructure is vital for improving your security posture, for detecting possible intrusions, and more
Wazuh integrates with the Elastic Stack. In this post you will learn how to create snapshots using Elasticsearch in order to back up your Wazuh indices.
How to use Wazuh to detect the different stages of emotet malware? Emotet is a malware originally designed as a trojan, and mainly used to steal sensitive and private information.
Wazuh introduced the Fluentd module, which allows the forwarding of information to a Fluentd server. Gain more security visibility on your system today.
We are going to attack a vulnerable server using Metasploit and then we will see how to use Wazuh to detect various of its attacks. This framework is the most [...]
Learn how to automatically execute YARA scans by using the active response module when a Wazuh FIM alert triggers.
Learn how to monitor the data stored in your S3 with Amazon Macie and Wazuh.
Learn how to keep track of changes made to your AWS resources and monitor user activity with AWS CloudTrail and Wazuh.
Using the National Vulnerability Database, Wazuh can detect vulnerabilities on Windows hosts by looking at their installed software [...]
Wazuh provides an out-of-the-box set of rules used for threat detection and response. This ruleset is continuously updated [...]
Learn how to deploying Wazuh cluster with Elastic Stack in EKS and how to add [...]