Building IoC files for threat intelligence with Wazuh XDR

Building IoC files for threat intelligence with Wazuh XDR

Post icon
/ Engineering

By

This blog post shows how we leverage the Wazuh XDR capability to identify and store IoCs detected in an organization’s infrastructure.

Read more
Post icon
/ Engineering

Building IoC files for threat intelligence with Wazuh XDR

By

This blog post shows how we leverage the Wazuh XDR capability to identify and store IoCs detected in an organization’s...

Read more
Monitoring VMware ESXi with Wazuh

Monitoring VMware ESXi with Wazuh

Post icon
/ Engineering

By and

This blog post shows how to leverage Wazuh to monitor and analyze security events in VMware ESXi endpoints and detect any malware present.

Read more
Post icon
/ Engineering

Monitoring VMware ESXi with Wazuh

By and

This blog post shows how to leverage Wazuh to monitor and analyze security events in VMware ESXi endpoints and detect...

Read more
Integrating Wazuh with Shuffle

Integrating Wazuh with Shuffle

Post icon
/ Engineering

By and

This blog post shows how to integrate Wazuh with Shuffle with the out-of-the-box integration introduced in Wazuh 4.4.

Read more
Post icon
/ Engineering

Integrating Wazuh with Shuffle

By and

This blog post shows how to integrate Wazuh with Shuffle with the out-of-the-box integration introduced in Wazuh 4.4.

Read more
Hunting for suspicious Windows LNK files with Wazuh XDR

Hunting for suspicious Windows LNK files with Wazuh XDR

Post icon
/ Engineering

By

In this blog post we have shown how Wazuh detects the presence of suspicious and malicious LNK files in Windows endpoints.

Read more
Post icon
/ Engineering

Hunting for suspicious Windows LNK files with Wazuh XDR

By

In this blog post we have shown how Wazuh detects the presence of suspicious and malicious LNK files in Windows...

Read more
Detecting BlackCat ransomware with Wazuh

Detecting BlackCat ransomware with Wazuh

Post icon
/ Engineering

By

In this blog post, we successfully demonstrated the capability of Wazuh to detect and remove BlackCat ransomware on a Windows endpoint.

Read more
Post icon
/ Engineering

Detecting BlackCat ransomware with Wazuh

By

In this blog post, we successfully demonstrated the capability of Wazuh to detect and remove BlackCat ransomware on a Windows...

Read more
Detecting and blocking Cacti remote code execution vulnerability (CVE-2022-46169) with Wazuh

Detecting and blocking Cacti remote code execution vulnerability (CVE-2022-46169) with Wazuh

Post icon
/ Engineering

By

In this blog post, we demonstrated how to detect the Cacti CVE-2022-46169 vulnerability and block exploitation attempts with Wazuh.

Read more
Post icon
/ Engineering

Detecting and blocking Cacti remote code execution vulnerability (CVE-2022-46169) with Wazuh

By

In this blog post, we demonstrated how to detect the Cacti CVE-2022-46169 vulnerability and block exploitation attempts with Wazuh.

Read more

Keep up to date with
our digest of articles