Automating Linux endpoint hardening with Wazuh

Automating Linux endpoint hardening with Wazuh

Post icon
/ Engineering
By

Endpoint hardening is a continuous process for securing modern IT environments against vulnerabilities and misconfigurations. It reduces the attack surface of endpoints and strengthens defenses against cyber threats by enforcing standardized security configurations. Organizations typically rely on established guidelines and frameworks, such as the Center for Internet Security (CIS) Benchmarks and NIST, for hardening. These […]

Read more
Detecting phishing attacks with Wazuh and Shuffle

Detecting phishing attacks with Wazuh and Shuffle

Post icon
/ Engineering
By

Phishing remains one of the most common social engineering attack techniques, often serving as the initial foothold for ransomware or data exfiltration. Threat actors exploit human trust through deceptive emails to bypass traditional perimeter defences and harvest sensitive data or deliver malicious payloads. As a result, organizations require mechanisms to detect and automatically respond to […]

Read more
Monitoring HashiCorp Vault activities with Wazuh

Monitoring HashiCorp Vault activities with Wazuh

Post icon
/ Engineering
By

Managing secrets in a distributed environment remains a significant challenge for many organizations. HashiCorp Vault (Vault) serves as a centralized system for storing and managing sensitive data such as API keys, tokens, passwords, and certificates. While centralization simplifies administration and access control, misconfigurations or unauthorized access can quickly lead to compromise and data loss. Therefore, […]

Read more
Enriching Wazuh vulnerability detection with Google Gemini integration

Enriching Wazuh vulnerability detection with Google Gemini integration

Post icon
/ Engineering
By

Organizations constantly struggle with vulnerabilities affecting operating systems, applications, and third-party software. These weaknesses expand the attack surface and can be exploited by attackers to compromise the confidentiality, integrity, or availability of systems. Wazuh offers vulnerability detection capability that identifies vulnerabilities in systems and software. However, security analysts must also determine a vulnerability’s exploitability, potential […]

Read more
Detecting and responding to GreenBlood ransomware with Wazuh

Detecting and responding to GreenBlood ransomware with Wazuh

Post icon
/ Engineering
By

GreenBlood ransomware is a Go-based ransomware family that has recently emerged in the threat landscape, targeting Windows environments while employing a double-extortion model. The malware is engineered for high-speed execution and parallel file encryption, leveraging the performance and portability benefits of a compiled, statically linked language. This design allows GreenBlood to rapidly impact infected systems […]

Read more
Detecting DNS tunneling attacks with Wazuh

Detecting DNS tunneling attacks with Wazuh

Post icon
/ Engineering
By

DNS tunneling allows attackers to hide malicious data and commands within legitimate Domain Name System (DNS) traffic, bypassing firewalls and security controls. Attackers exploit the fact that DNS traffic is often permitted on networks without deep inspection to encode sensitive data and commands into DNS queries and responses. This creates a covert communication channel between […]

Read more
Detecting and responding to Salat stealer with Wazuh

Detecting and responding to Salat stealer with Wazuh

Post icon
/ Engineering
By

Salat stealer is a rapidly emerging Go-based information stealer offered under a Malware-as-a-Service (MaaS) model, enabling widespread access to the malware for threat actors. The malware leverages dedicated command and control (C2) infrastructure to manage infected endpoints and exfiltrate stolen data at scale. It primarily targets Windows endpoints to collect browser credentials, Telegram sessions, and […]

Read more
Automating Windows endpoint hardening with Wazuh 

Automating Windows endpoint hardening with Wazuh 

Post icon
/ Engineering
By

Endpoint hardening is a continuous process for securing modern IT environments against vulnerabilities and misconfigurations. It reduces the attack surface of endpoints and strengthens defenses against cyber threats by enforcing standardized security configurations. Organizations typically rely on established guidelines such as the Center for Internet Security (CIS) Benchmarks and frameworks like NIST, which provide best […]

Read more
Monitoring access control violations with Open Policy Agent (OPA) and Wazuh

Monitoring access control violations with Open Policy Agent (OPA) and Wazuh

Post icon
/ Engineering
By

Access control protects the confidentiality, integrity, and availability of systems and data. It is important because attackers frequently exploit legitimate accounts, excessive permissions, and weak policy enforcement to blend into normal operations. While access control systems are designed to prevent unauthorized actions, the decisions they generate, such as denied requests, privilege escalations, or anomalous authorization […]

Read more
Incident management with Wazuh and Rootly

Incident management with Wazuh and Rootly

Post icon
/ Engineering
By

Incident management involves detecting, responding to, and resolving unplanned events efficiently across systems and teams. It is important for organizations aiming to reduce downtime, mitigate risks, and maintain operational resilience. Incident management platforms like Rootly are designed to streamline and automate response workflows for engineering, operations, and security teams. Integrating Rootly with Wazuh connects Wazuh […]

Read more
Detecting and responding to Rhadamanthys stealer with Wazuh

Detecting and responding to Rhadamanthys stealer with Wazuh

Post icon
/ Engineering
By

Rhadamanthys Stealer is a credential-harvesting malware sold as Malware-as-a-Service (MaaS). It is known for its modular architecture, data-stealing capabilities, and continuous updates driven by criminal marketplaces. Attackers distribute Rhadamanthys stealer via phishing emails, cracked software, malicious ads, and fake installers. The stealer primarily targets Windows endpoints to extract browser passwords, crypto wallets, system metadata, autofill […]

Read more
Keep up to date
with our digest of articles