Submitting the form

All results for 'Awwal Ishiaku'

Showing 12 of 15 results

Detecting Log4Shell with Wazuh

Blog / Engineering / Detecting Log4Shell with Wazuh

The Apache Log4J is one of the most common logging libraries in Java, mainly used for error messages. It is part of several high valued applications including iCloud, Twitter, and...

Analyzing ModSecurity events with Wazuh

Blog / Engineering / Analyzing ModSecurity events with Wazuh

In this blog post, we explain how to analyze ModSecurity events with Wazuh. Wazuh is a unified XDR and SIEM solution. It can be used to collect, analyze and correlate...

Detecting PwnKit (CVE-2021-4034) with Wazuh

Blog / Engineering / Detecting PwnKit (CVE-2021-4034) with Wazuh

Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating systems. It provides an organized way for non-privileged processes to communicate with privileged ones. In contrast to...

Detecting Spring4Shell (CVE-2022-22965) with Wazuh

Blog / Engineering / Detecting Spring4Shell (CVE-2022-22965) with Wazuh

A remote code execution (RCE) vulnerability that affects the Spring Java framework has been discovered. The vulnerability is dubbed Spring4Shell or SpringShell by the security community. It has the designation...

Auditing Kubernetes with Wazuh

Blog / Engineering / Auditing Kubernetes with Wazuh

Kubernetes is an open source platform that helps in managing the automation of container applications. Kubernetes deploys and manages applications in multiple nodes that run in a cluster for scalability....

Integrating Cisco Secure Endpoint with Wazuh

Blog / Engineering / Integrating Cisco Secure Endpoint with Wazuh

In this blog post, we combine the capabilities of Cisco Secure Endpoint with the versatility of Wazuh, a unified XDR and SIEM platform. Cisco Secure Endpoint offers cloud-delivered endpoint detection...

Detecting keyloggers (T1056.001) on Linux endpoints

Blog / Engineering / Detecting keyloggers (T1056.001) on Linux endpoints

Keyloggers are spyware that monitor and record user keystrokes on endpoints. Some variants relay the recorded data to an external party or attacker, enabling threat actors to exfiltrate user credentials...

No results for 'Awwal Ishiaku'

Please make sure that all words are spelled correctly.