Newsroom

Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity

Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity

>
February 9th 2024 / The Hacker News
By The Hacker News

Cloud computing has innovated how organizations operate and manage IT operations, such as data storage, application deployment, networking, and overall resource management…

February 9th 2024 / The Hacker News

Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity

By The Hacker News

Cloud computing has innovated how organizations operate and manage IT operations, such as data storage, application deployment, networking, and overall resource management…

Read more

>
Getting Started with Wazuh: A Beginner’s Introduction to Your First SIEM

Getting Started with Wazuh: A Beginner’s Introduction to Your First SIEM

>
February 4th 2024 / Medium
By Kanchanatharusha

Expect a few slip-ups so… forgive the blunders. I’m currently working as a System Administrator, but during my internship, I dabbled in the realm of Security Operations Center (SOC) analysis…

February 4th 2024 / Medium

Getting Started with Wazuh: A Beginner’s Introduction to Your First SIEM

By Kanchanatharusha

Expect a few slip-ups so… forgive the blunders. I’m currently working as a System Administrator, but during my internship, I dabbled in the realm of Security Operations Center (SOC) analysis…

Read more

>
Migrate data from Elasticsearch to Opensearch/Wazuh indexer: Re-index API

Migrate data from Elasticsearch to Opensearch/Wazuh indexer: Re-index API

>
January 30th 2024 / Medium
By Elwali Karkoub

As the snapshots taken with Elasticsearch 7.12.0 and above are incompatible with OpenSearch or Wazuh indexer, This write-up describes how to move data leveraging the Re-index remote API…

January 30th 2024 / Medium

Migrate data from Elasticsearch to Opensearch/Wazuh indexer: Re-index API

By Elwali Karkoub

As the snapshots taken with Elasticsearch 7.12.0 and above are incompatible with OpenSearch or Wazuh indexer, This write-up describes how to move data leveraging the Re-index remote API…

Read more

>
File Integrity Monitoring (FIM) in Wazuh: A Step-by-Step Guide

File Integrity Monitoring (FIM) in Wazuh: A Step-by-Step Guide

>
January 29th 2024 / Medium
By Riya Jain

By keeping an eye out for and identifying unauthorized changes to files, File Integrity Monitoring (FIM) is essential for ensuring the security and integrity of a system. Let me give you some…

January 29th 2024 / Medium

File Integrity Monitoring (FIM) in Wazuh: A Step-by-Step Guide

By Riya Jain

By keeping an eye out for and identifying unauthorized changes to files, File Integrity Monitoring (FIM) is essential for ensuring the security and integrity of a system. Let me give you some…

Read more

>
Role of Wazuh in building a robust cybersecurity architecture

Role of Wazuh in building a robust cybersecurity architecture

>
January 26th 2024 / Bleeping Computer
By Bleeping Computer

Cybersecurity architecture refers to the design and framework governing an organization’s approach to securing information systems. It outlines the components, policies,…

January 26th 2024 / Bleeping Computer

Role of Wazuh in building a robust cybersecurity architecture

By Bleeping Computer

Cybersecurity architecture refers to the design and framework governing an organization’s approach to securing information systems. It outlines the components, policies,…

Read more

>
Wazuh vs. traditional cybersecurity measures: why Wazuh comes out on top

Wazuh vs. traditional cybersecurity measures: why Wazuh comes out on top

>
January 25th 2024 / PR Newswire
By PR Newswire

SAN JOSÉ, Calif., Jan. 25, 2024 /PRNewswire/ — Traditional cybersecurity measures focus on deploying signature-based antivirus solutions and establishing strong perimeter defenses…

January 25th 2024 / PR Newswire

Wazuh vs. traditional cybersecurity measures: why Wazuh comes out on top

By PR Newswire

SAN JOSÉ, Calif., Jan. 25, 2024 /PRNewswire/ — Traditional cybersecurity measures focus on deploying signature-based antivirus solutions and establishing strong perimeter defenses…

Read more

>
EDR Silencer Detection — Part 2 (Yara + Wazuh)

EDR Silencer Detection — Part 2 (Yara + Wazuh)

>
January 21st 2024 / Medium
By Elwali Karkoub

This article serves as a follow-up to the previously discussed topic, focusing on enhancing the detection of the EDRSilencer tool. It is advisable to review the preceding article…

January 21st 2024 / Medium

EDR Silencer Detection — Part 2 (Yara + Wazuh)

By Elwali Karkoub

This article serves as a follow-up to the previously discussed topic, focusing on enhancing the detection of the EDRSilencer tool. It is advisable to review the preceding article…

Read more

>