Detecting Lockbit 3.0 ransomware with Wazuh

Detecting Lockbit 3.0 ransomware with Wazuh

Post icon
/ Engineering

By

Lockbit ransomware uses a broad range of techniques to target organizations worldwide. Check our new blog post to learn how to detect Lockbit 3.0 ransomware...

Read more
Post icon
/ Engineering

Detecting Lockbit 3.0 ransomware with Wazuh

By

Lockbit ransomware uses a broad range of techniques to target organizations worldwide. Check our new blog post to learn how...

Read more
How to detect and mitigate Panchan botnet using Wazuh

How to detect and mitigate Panchan botnet using Wazuh

Post icon
/ Engineering

By

Introduction  Panchan is a new botnet written in Golang. It leverages built-in Golang goroutines features for flexibility in the malware infection and execution within Linux...

Read more
Post icon
/ Engineering

How to detect and mitigate Panchan botnet using Wazuh

By

Introduction  Panchan is a new botnet written in Golang. It leverages built-in Golang goroutines features for flexibility in the malware...

Read more
Detecting illegitimate crypto miners on Linux endpoints

Detecting illegitimate crypto miners on Linux endpoints

Post icon
/ Engineering

By

Crypto miners are programs that utilize computer resources to mine cryptocurrency. Mining is the process that several cryptocurrencies use to generate new coins and verify...

Read more
Post icon
/ Engineering

Detecting illegitimate crypto miners on Linux endpoints

By

Crypto miners are programs that utilize computer resources to mine cryptocurrency. Mining is the process that several cryptocurrencies use to...

Read more
Detecting Windows Screensaver persistence attack with Wazuh

Detecting Windows Screensaver persistence attack with Wazuh

Post icon
/ Engineering

By

Screensaver is a feature on operating systems that lets users display a message or graphic animation after a certain amount of idle time has elapsed....

Read more
Post icon
/ Engineering

Detecting Windows Screensaver persistence attack with Wazuh

By

Screensaver is a feature on operating systems that lets users display a message or graphic animation after a certain amount...

Read more
How to detect Black Basta malware with Wazuh

How to detect Black Basta malware with Wazuh

Post icon
/ Engineering

By

Black Basta is a ransomware that emerged in April 2022, it mostly targets enterprises and businesses. The ransomware has been observed to append the .basta...

Read more
Post icon
/ Engineering

How to detect Black Basta malware with Wazuh

By

Black Basta is a ransomware that emerged in April 2022, it mostly targets enterprises and businesses. The ransomware has been...

Read more
Detecting Dirty Pipe vulnerability with Wazuh (CVE-2022-0847)

Detecting Dirty Pipe vulnerability with Wazuh (CVE-2022-0847)

Post icon
/ Engineering

By

A vulnerability in the Linux kernel, dubbed “Dirty Pipe”, allows unprivileged users to overwrite data in read-only files. This can allow users to gain access...

Read more
Post icon
/ Engineering

Detecting Dirty Pipe vulnerability with Wazuh (CVE-2022-0847)

By

A vulnerability in the Linux kernel, dubbed “Dirty Pipe”, allows unprivileged users to overwrite data in read-only files. This can...

Read more

Keep up to date with
our digest of articles