Newsroom

Wazuh | Detect LOLBAS Attacks

Wazuh | Detect LOLBAS Attacks

>
September 2nd 2024 / Medium
By Ali Sefer

As cyber threats become increasingly sophisticated, integrating powerful tools for security monitoring and threat intelligence is critical. In this blog post, I will guide you through integrating Wazuh — an open-source security monitoring platform — with…

September 2nd 2024 / Medium

Wazuh | Detect LOLBAS Attacks

By Ali Sefer

As cyber threats become increasingly sophisticated, integrating powerful tools for security monitoring and threat intelligence is critical. In this blog post, I will guide you through integrating Wazuh — an open-source security monitoring platform — with…

Read more

>
Introduction to Wazuh: Setting up and Detecting Malware

Introduction to Wazuh: Setting up and Detecting Malware

>
August 28th 2024 / Medium
By Stjimmyyy

This guide will walk you through the initial installation of Wazuh, including the setup process on various operating systems, and provide instructions for integrating essential tools like Sysmon for enhanced logging and…

August 28th 2024 / Medium

Introduction to Wazuh: Setting up and Detecting Malware

By Stjimmyyy

This guide will walk you through the initial installation of Wazuh, including the setup process on various operating systems, and provide instructions for integrating essential tools like Sysmon for enhanced logging and…

Read more

>
Top 5 Best Extended Detection and Response Software (XDR) in 2024

Top 5 Best Extended Detection and Response Software (XDR) in 2024

>
August 12th 2024 / Tech Times
By Jules R.

Enterprises encounter complex security challenges as the threat landscape continues to evolve. Extended detection and response is a software-as-a-service tool that provides a comprehensive view of an organization’s security posture by collecting data…

August 12th 2024 / Tech Times

Top 5 Best Extended Detection and Response Software (XDR) in 2024

By Jules R.

Enterprises encounter complex security challenges as the threat landscape continues to evolve. Extended detection and response is a software-as-a-service tool that provides a comprehensive view of an organization’s security posture by collecting data…

Read more

>
Enhancing Incident Response Readiness with Wazuh

Enhancing Incident Response Readiness with Wazuh

>
August 5th 2024 / The Hacker News
By The Hacker News

Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such as timely detection, comprehensive data collection, and coordinated actions to enhance readiness…

August 5th 2024 / The Hacker News

Enhancing Incident Response Readiness with Wazuh

By The Hacker News

Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such as timely detection, comprehensive data collection, and coordinated actions to enhance readiness…

Read more

>
Deploying Wazuh in Local Kubernetes Environment: Simplifying Security Monitoring

Deploying Wazuh in Local Kubernetes Environment: Simplifying Security Monitoring

>
July 17th 2024 / Medium
By Kevin Tim

As organizations increasingly adopt microservices architectures and containerization, the need for proactive security measures becomes more critical. Wazuh stands out as a versatile tool for real-time threat detection, integrity monitoring…

July 17th 2024 / Medium

Deploying Wazuh in Local Kubernetes Environment: Simplifying Security Monitoring

By Kevin Tim

As organizations increasingly adopt microservices architectures and containerization, the need for proactive security measures becomes more critical. Wazuh stands out as a versatile tool for real-time threat detection, integrity monitoring…

Read more

>
Wazuh Manager

Wazuh Manager

>
July 17th 2024 / Medium
By Marouane Louguid

You can deploy Wazuh as a single-node or multi-node stack. Single-node deployment: Deploys one Wazuh manager, indexer, and dashboard node. Multi-node deployment: Deploys two Wazuh manager nodes…

July 17th 2024 / Medium

Wazuh Manager

By Marouane Louguid

You can deploy Wazuh as a single-node or multi-node stack. Single-node deployment: Deploys one Wazuh manager, indexer, and dashboard node. Multi-node deployment: Deploys two Wazuh manager nodes…

Read more

>
Leveraging Wazuh for CIA triad compliance

Leveraging Wazuh for CIA triad compliance

>
July 16th 2024 / Zero Hedge
By Zero Hedge

The CIA triad is a security model that provides principles for protecting IT assets such as hardware, software, firmware, and information from various threats. The abbreviation CIA stands for Confidentiality, Integrity, and Availability…

July 16th 2024 / Zero Hedge

Leveraging Wazuh for CIA triad compliance

By Zero Hedge

The CIA triad is a security model that provides principles for protecting IT assets such as hardware, software, firmware, and information from various threats. The abbreviation CIA stands for Confidentiality, Integrity, and Availability…

Read more

>