Detecting Living Off the Land attacks with Wazuh

Detecting Living Off the Land attacks with Wazuh

Post icon
/ Engineering
By

Living Off the Land (LOTL) attacks are a cyber threat technique in which attackers leverage existing, legitimate tools and features within an environment to conduct malicious activities. This approach allows attackers to blend in with normal system activity, making detection by conventional security measures more challenging.  The solution to LOTL attacks is to use a […]

Read more
Post icon
/ Engineering

Detecting Living Off the Land attacks with Wazuh

By

Living Off the Land (LOTL) attacks are a cyber threat technique in which attackers leverage existing, legitimate tools and features within an environment to conduct malicious activities. This approach allows attackers to blend in with normal system activity, making detection by conventional security measures more challenging.  The solution to LOTL attacks is to use a […]

Read more
Kuiper ransomware detection and response with Wazuh

Kuiper ransomware detection and response with Wazuh

Post icon
/ Engineering
By

The Kuiper ransomware is a strain of ransomware written in Golang that encrypts data on various endpoints such as Windows, macOS, and Linux in exchange for money.  It utilizes a combination of RSA, ChaCha20, and AES encryption algorithms to encrypt files on infected endpoints. Specifically, it employs RSA for key exchange, ChaCha20 for initial encryption, […]

Read more
Post icon
/ Engineering

Kuiper ransomware detection and response with Wazuh

By

The Kuiper ransomware is a strain of ransomware written in Golang that encrypts data on various endpoints such as Windows, macOS, and Linux in exchange for money.  It utilizes a combination of RSA, ChaCha20, and AES encryption algorithms to encrypt files on infected endpoints. Specifically, it employs RSA for key exchange, ChaCha20 for initial encryption, […]

Read more
Detecting XZ Utils vulnerability (CVE-2024-3094) with Wazuh

Detecting XZ Utils vulnerability (CVE-2024-3094) with Wazuh

Post icon
/ Engineering
By and

XZ Utils is a widely utilized suite of command-line tools for lossless data compression on virtually all Unix-like operating systems, including Linux. Among its prominent components are xz and lzma, useful in compressing files, distributing packages, and managing backups.  Andres Freund discovered a backdoor within XZ Utils, specifically in the liblzma library, and reported it […]

Read more
Post icon
/ Engineering

Detecting XZ Utils vulnerability (CVE-2024-3094) with Wazuh

By and

XZ Utils is a widely utilized suite of command-line tools for lossless data compression on virtually all Unix-like operating systems, including Linux. Among its prominent components are xz and lzma, useful in compressing files, distributing packages, and managing backups.  Andres Freund discovered a backdoor within XZ Utils, specifically in the liblzma library, and reported it […]

Read more
Monitoring PostgreSQL database with Wazuh

Monitoring PostgreSQL database with Wazuh

Post icon
/ Engineering
By

PostgreSQL is an open source, highly stable database management system that uses several features to securely store and scale data workloads. PostgreSQL is supported by major operating systems such as Linux, macOS, Microsoft Windows, FreeBSD, OpenBSD, and Solaris. It is primarily used by users, organizations, and businesses to store data for mobile applications, websites, analytics […]

Read more
Post icon
/ Engineering

Monitoring PostgreSQL database with Wazuh

By

PostgreSQL is an open source, highly stable database management system that uses several features to securely store and scale data workloads. PostgreSQL is supported by major operating systems such as Linux, macOS, Microsoft Windows, FreeBSD, OpenBSD, and Solaris. It is primarily used by users, organizations, and businesses to store data for mobile applications, websites, analytics […]

Read more
Detecting and responding to Phobos ransomware using Wazuh

Detecting and responding to Phobos ransomware using Wazuh

Post icon
/ Engineering
By

Phobos ransomware has become a growing concern due to its tactics in targeting state and territorial governments. The ransomware group compromises Windows endpoints using phishing as the primary method to gain initial entry, deploying covert payloads such as SmokeLoader and Cobalt Strike. Also, attackers exploit vulnerable networks by scanning and brute-forcing open Remote Desktop Protocol […]

Read more
Post icon
/ Engineering

Detecting and responding to Phobos ransomware using Wazuh

By

Phobos ransomware has become a growing concern due to its tactics in targeting state and territorial governments. The ransomware group compromises Windows endpoints using phishing as the primary method to gain initial entry, deploying covert payloads such as SmokeLoader and Cobalt Strike. Also, attackers exploit vulnerable networks by scanning and brute-forcing open Remote Desktop Protocol […]

Read more
Integrating Wazuh with Fluentd for unified logging

Integrating Wazuh with Fluentd for unified logging

Post icon
/ Engineering
By and

Wazuh introduced the Fluentd module, which allows the forwarding of information to a Fluentd server. Gain more security visibility on your system today.

Read more
Post icon
/ Engineering

Integrating Wazuh with Fluentd for unified logging

By and

Wazuh introduced the Fluentd module, which allows the forwarding of information to a Fluentd server. Gain more security visibility on your system today.

Read more
Deploying Wazuh agents using Windows Group Policy Objects (GPO)

Deploying Wazuh agents using Windows Group Policy Objects (GPO)

Post icon
/ Engineering
By and

In this case, we will learn how to deploying the Wazuh agent on a Windows Active Directory infrastructure using Group Policy Objects (GPO).

Read more
Post icon
/ Engineering

Deploying Wazuh agents using Windows Group Policy Objects (GPO)

By and

In this case, we will learn how to deploying the Wazuh agent on a Windows Active Directory infrastructure using Group Policy Objects (GPO).

Read more
Wazuh agent groups and centralized configuration

Wazuh agent groups and centralized configuration

Post icon
/ Engineering
By and

Centralized configuration management offers a unified approach for organizing, controlling, and modifying configurations within a large infrastructure. They mitigate the challenges associated with manual configuration management, such as human errors, inconsistencies, and time-consuming updates. Wazuh, the unified XDR and SIEM platform, offers a feature for streamlining agent configuration and enhancing security management: Wazuh agent groups […]

Read more
Post icon
/ Engineering

Wazuh agent groups and centralized configuration

By and

Centralized configuration management offers a unified approach for organizing, controlling, and modifying configurations within a large infrastructure. They mitigate the challenges associated with manual configuration management, such as human errors, inconsistencies, and time-consuming updates. Wazuh, the unified XDR and SIEM platform, offers a feature for streamlining agent configuration and enhancing security management: Wazuh agent groups […]

Read more
Monitoring AWS Managed Microsoft Active Directory with Wazuh

Monitoring AWS Managed Microsoft Active Directory with Wazuh

Post icon
/ Engineering
By

AWS Managed Microsoft Active Directory (AD) is an AWS Directory Service that provides users, businesses, and organizations different options to use Microsoft Active Directory (AD) with other AWS services. AWS Managed Microsoft AD stores information about users, groups, and devices, and system administrators use this Directory Service to manage access to this information.  AWS Managed […]

Read more
Post icon
/ Engineering

Monitoring AWS Managed Microsoft Active Directory with Wazuh

By

AWS Managed Microsoft Active Directory (AD) is an AWS Directory Service that provides users, businesses, and organizations different options to use Microsoft Active Directory (AD) with other AWS services. AWS Managed Microsoft AD stores information about users, groups, and devices, and system administrators use this Directory Service to manage access to this information.  AWS Managed […]

Read more
Integrating SentinelOne XDR with Wazuh

Integrating SentinelOne XDR with Wazuh

Post icon
/ Engineering
By

SentinelOne XDR is designed to provide comprehensive protection against advanced threats and cyberattacks. By leveraging sophisticated behavioral analysis and threat intelligence, SentinelOne XDR delivers a robust defense mechanism to ensure a proactive and adaptive approach to cybersecurity. By integrating SentinelOne XDR with Wazuh, a unified XDR and SIEM platform, security analysts and administrators can benefit […]

Read more
Post icon
/ Engineering

Integrating SentinelOne XDR with Wazuh

By

SentinelOne XDR is designed to provide comprehensive protection against advanced threats and cyberattacks. By leveraging sophisticated behavioral analysis and threat intelligence, SentinelOne XDR delivers a robust defense mechanism to ensure a proactive and adaptive approach to cybersecurity. By integrating SentinelOne XDR with Wazuh, a unified XDR and SIEM platform, security analysts and administrators can benefit […]

Read more
Detecting AsyncRAT with Wazuh

Detecting AsyncRAT with Wazuh

Post icon
/ Engineering
By

AsyncRAT is an open source remote access tool that is commonly used by threat actors for file exfiltration and remote desktop control. Threat actors use script injectors and phishing attachments to deliver AsyncRAT to victim endpoints across numerous campaigns. AsyncRAT has consistently ranked among the top 10 malware trends on Any.run for several months. BleepingComputer […]

Read more
Post icon
/ Engineering

Detecting AsyncRAT with Wazuh

By

AsyncRAT is an open source remote access tool that is commonly used by threat actors for file exfiltration and remote desktop control. Threat actors use script injectors and phishing attachments to deliver AsyncRAT to victim endpoints across numerous campaigns. AsyncRAT has consistently ranked among the top 10 malware trends on Any.run for several months. BleepingComputer […]

Read more
Monitoring USB drives in macOS using Wazuh

Monitoring USB drives in macOS using Wazuh

Post icon
/ Engineering
By

USB drives are useful for transferring files on macOS systems, providing a quick and simple way to share documents, photos, and more between devices. They’re plug-and-play, allowing users to easily access and transfer data. However, it’s essential to be cautious about security. USB drives can carry malware, posing a risk to your macOS systems. Organizations […]

Read more
Post icon
/ Engineering

Monitoring USB drives in macOS using Wazuh

By

USB drives are useful for transferring files on macOS systems, providing a quick and simple way to share documents, photos, and more between devices. They’re plug-and-play, allowing users to easily access and transfer data. However, it’s essential to be cautious about security. USB drives can carry malware, posing a risk to your macOS systems. Organizations […]

Read more
Keep up to date
with our digest of articles