Blog / Engineering / Exploring security alerting options for improved threat detection in Wazuh – Part 1
Security alerting enables organizations to promptly detect potential security incidents, allowing for rapid response and risk mitigation. Organizations can immediately prevent breaches, comply with regulatory requirements, and optimize operational efficiency...
Blog / Engineering / Filtering security data with the Wazuh Query Language
The Wazuh Query Language (WQL) simplifies security data filtering in the Wazuh dashboard with its user-friendly format. With the use of a specialized querying language like Wazuh Query Language, security...
Blog / Engineering / Monitoring USB drives in macOS using Wazuh
USB drives are useful for transferring files on macOS systems, providing a quick and simple way to share documents, photos, and more between devices. They’re plug-and-play, allowing users to easily...
Blog / Engineering / Empowering threat visibility with Wazuh and Maltiverse
Maltiverse is a threat intelligence platform that collects, analyses, and provides insights into malicious domains, IP addresses, and other digital artifacts commonly associated with cyber threats. It provides a wealth...
Blog / Engineering / Enhancing IT security with anomaly detection in Wazuh
Anomaly detection in cybersecurity is a monitoring capability to detect suspicious activity or changes in data or networks. By detecting unusual patterns of behavior, organizations can detect and isolate abnormal...
Blog / Engineering / Monitoring VMware ESXi with Wazuh
This blog post shows how to leverage Wazuh to monitor and analyze security events in VMware ESXi endpoints and detect any malware present.
Blog / Engineering / Monitoring USB drives in Windows using Wazuh
Our new blog post shows how Wazuh can help organizations to monitor USB drives plugged into monitored Windows endpoints in real-time