Blog / Engineering / Exploring security alerting options for improved threat detection in Wazuh – Part 2
An improved security alerting system enhances data breach prevention, ensures compliance, and streamlines operations through timely detection and efficient alert management. In exploring security alerting options for improved threat detection in Wazuh – Part 1, we covered the basic configuration and the first two monitor types. Now, let’s explore the remaining monitor types for better […]
Blog / Engineering / Empowering threat visibility with Wazuh and Maltiverse
Maltiverse is a threat intelligence platform that collects, analyses, and provides insights into malicious domains, IP addresses, and other digital artifacts commonly associated with cyber threats. It provides a wealth of information on known malicious entities and indicators of compromise (IOCs), making it a valuable resource for cybersecurity professionals. Extensive threat intelligence of Maltiverse complements […]
Blog / Engineering / Monitoring USB drives in Windows using Wazuh
Our new blog post shows how Wazuh can help organizations to monitor USB drives plugged into monitored Windows endpoints in real-time
Blog / Engineering / Monitoring VMware ESXi with Wazuh
This blog post shows how to leverage Wazuh to monitor and analyze security events in VMware ESXi endpoints and detect any malware present.
Blog / Engineering / Enhancing IT security with anomaly detection in Wazuh
Anomaly detection in cybersecurity is a monitoring capability to detect suspicious activity or changes in data or networks. By detecting unusual patterns of behavior, organizations can detect and isolate abnormal activities that could indicate a malicious threat. Anomalies can be found in different forms of security telemetry, including network traffic, user behavior, and system resource […]
Blog / Engineering / Monitoring USB drives in macOS using Wazuh
USB drives are useful for transferring files on macOS systems, providing a quick and simple way to share documents, photos, and more between devices. They’re plug-and-play, allowing users to easily access and transfer data. However, it’s essential to be cautious about security. USB drives can carry malware, posing a risk to your macOS systems. Organizations […]
Blog / Engineering / Filtering security data with the Wazuh Query Language
The Wazuh Query Language (WQL) simplifies security data filtering in the Wazuh dashboard with its user-friendly format. With the use of a specialized querying language like Wazuh Query Language, security analysts can analyze and query security log data, enabling effective detection and response to security threats. WQL provides a solution for navigating complex datasets, allowing […]
Blog / Engineering / Exploring security alerting options for improved threat detection in Wazuh – Part 1
Security alerting enables organizations to promptly detect potential security incidents, allowing for rapid response and risk mitigation. Organizations can immediately prevent breaches, comply with regulatory requirements, and optimize operational efficiency by receiving timely alerts. Automated security alerting streamlines incident response processes, minimizing downtime and optimizing resource usage while demonstrating a commitment to proactive security measures. […]