Submitting the form

All results for 'Henadence Anyam'

Showing 7 of 7 results

RapperBot botnet detection and mitigation with Wazuh

Blog / Engineering / RapperBot botnet detection and mitigation with Wazuh

...variant" author = "Henadence Anyam" reference = "Internal Research" date = "2022-08-15" hash1 = "88bbb772b8731296822646735aacbfb53014fbb7f90227b44523d7577e0a7ce6" hash2 = "ff09cf7dfd1dc1466815d4df098065510eec504099ebb02b830309067031fe04" strings: $a1 = "cmd" fullword ascii $a2 = "sh" fullword ascii $a3...

Docker container security monitoring with Wazuh

Blog / Engineering / Docker container security monitoring with Wazuh

Docker has become a popular framework for application deployment since its development due to its benefits. For example, it makes it easier for organizations to enhance the portability of their...

Web shell attack detection with Wazuh

Blog / Engineering / Web shell attack detection with Wazuh

Cyber attackers are known to utilize various techniques to maintain persistence on compromised endpoints. These techniques ensure that attackers do not repeat exploitation phases when compromised web servers reboot, change...

Detecting common Linux persistence techniques with Wazuh

Blog / Engineering / Detecting common Linux persistence techniques with Wazuh

Persistence techniques are mechanisms or configurations threat actors use to maintain illicit access to compromised endpoints after gaining initial access. Persistence guarantees that attackers have endpoint access regardless of system...

Configuration management of Wazuh endpoints using Ansible

Blog / Engineering / Configuration management of Wazuh endpoints using Ansible

Configuration management is the process of maintaining computer systems, servers, network devices, and software in a desired and consistent state. Configuration management tools allow you to quickly and remotely control...

No results for 'Henadence Anyam'

Please make sure that all words are spelled correctly.