Newsroom

Achieve Security Compliance with Wazuh File Integrity Monitoring

Achieve Security Compliance with Wazuh File Integrity Monitoring

>
May 21st 2024 / The Hacker News
By The Hacker News

File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps organizations audit important files and system configurations by routinely scanning and verifying their integrity…

May 21st 2024 / The Hacker News

Achieve Security Compliance with Wazuh File Integrity Monitoring

By The Hacker News

File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps organizations audit important files and system configurations by routinely scanning and verifying their integrity…

Read more

>
Wazuh Rule Writing With CoPilot AI Module

Wazuh Rule Writing With CoPilot AI Module

>
May 16th 2024 / Medium
By SOCFortress

Managing security alerts in Wazuh can be a daunting task, especially when facing alert flooding. The introduction of the CoPilot AI Module offers a promising solution to this challenge…

May 16th 2024 / Medium

Wazuh Rule Writing With CoPilot AI Module

By SOCFortress

Managing security alerts in Wazuh can be a daunting task, especially when facing alert flooding. The introduction of the CoPilot AI Module offers a promising solution to this challenge…

Read more

>
Detecting Malicious File Hashes with Wazuh and ThreatFox

Detecting Malicious File Hashes with Wazuh and ThreatFox

>
May 16th 2024 / Datasec
By Pablo Rizzo

ThreatFox is a free platform from abuse.ch with the goal of sharing indicators of compromise (IOCs) associated with malware with the infosec community…

May 16th 2024 / Datasec

Detecting Malicious File Hashes with Wazuh and ThreatFox

By Pablo Rizzo

ThreatFox is a free platform from abuse.ch with the goal of sharing indicators of compromise (IOCs) associated with malware with the infosec community…

Read more

>
Improving cyber defense with open source SIEM and XDR

Improving cyber defense with open source SIEM and XDR

>
May 15th 2024 / The Register
By The Register

A cyber defense strategy outlines policies, procedures, and technologies to prevent, detect, and respond to cyber-attacks. This helps avoid financial loss, reputational damage, and legal…

May 15th 2024 / The Register

Improving cyber defense with open source SIEM and XDR

By The Register

A cyber defense strategy outlines policies, procedures, and technologies to prevent, detect, and respond to cyber-attacks. This helps avoid financial loss, reputational damage, and legal…

Read more

>
Responding to Various Security Incidents using Wazuh

Responding to Various Security Incidents using Wazuh

>
May 14th 2024 / Medium
By Sajid Mahbub

Wazuh is a security information and event management (SIEM) platform that helps organizations monitor, detect, and respond to security threats in real-time…

May 14th 2024 / Medium

Responding to Various Security Incidents using Wazuh

By Sajid Mahbub

Wazuh is a security information and event management (SIEM) platform that helps organizations monitor, detect, and respond to security threats in real-time…

Read more

>
Wazuh Installation Simplified: A Beginner’s Guide to Securing Your Systems

Wazuh Installation Simplified: A Beginner’s Guide to Securing Your Systems

>
May 7th 2024 / Medium
By Rajeev Gaddam

I am Rajeev Gaddam, a security researcher with a passion for exploring the intricacies of the Wazuh domain. I have embarked on an exciting journey into the realm of academic publishing and…

May 7th 2024 / Medium

Wazuh Installation Simplified: A Beginner’s Guide to Securing Your Systems

By Rajeev Gaddam

I am Rajeev Gaddam, a security researcher with a passion for exploring the intricacies of the Wazuh domain. I have embarked on an exciting journey into the realm of academic publishing and…

Read more

>
Log data analysis for threat detection and response with Wazuh

Log data analysis for threat detection and response with Wazuh

>
May 7th 2024 / Tech Times
By Eryka S

Log data analysis involves reviewing logs generated from different sources to gain insight into the activities of assets in an IT infrastructure. It helps organizations detect and remediate security threats, and meet regulatory requirements…

May 7th 2024 / Tech Times

Log data analysis for threat detection and response with Wazuh

By Eryka S

Log data analysis involves reviewing logs generated from different sources to gain insight into the activities of assets in an IT infrastructure. It helps organizations detect and remediate security threats, and meet regulatory requirements…

Read more

>