Submitting the form

All results for 'Adedamola Okelola'

Showing 8 of 8 results

Detecting njRAT malware with Wazuh

Blog / Engineering / Detecting njRAT malware with Wazuh

njRAT, also known as Bladabindi, is a remote access trojan (RAT) designed to allow an attacker  remotely control an infected Windows endpoints. The malware gained significant attention in 2020 after being distributed through a cracked version of VMWare software. As of August 2023, ANY.RUN reports that njRAT’s recent outbreak has established its position as one […]

Adversary emulation on GCP with Stratus Red Team and Wazuh

Blog / Engineering / Adversary emulation on GCP with Stratus Red Team and Wazuh

Google Cloud Platform (GCP) is a highly scalable cloud computing platform offered by Google. It provides organizations with several cloud-based services, including computing, storage, machine learning, and data analytics. GCP is renowned for its robust infrastructure, global network, and cutting-edge technologies, making it an ideal choice for businesses seeking to leverage the cloud for their […]

Cloud Security Posture Management on Google Cloud Platform with Wazuh

Blog / Engineering / Cloud Security Posture Management on Google Cloud Platform with Wazuh

Cloud Security Posture Management (CSPM) is important in ensuring the security and compliance of cloud environments. In cloud computing where organizations can quickly and easily provision, configure, and modify cloud resources, the potential for security misconfigurations increases. These security issues can arise due to mismanagement of permissions, gaps in network configurations, and various other factors. […]

Cloud Security Posture Management on Microsoft Azure with Wazuh

Blog / Engineering / Cloud Security Posture Management on Microsoft Azure with Wazuh

Cloud Security Posture Management (CSPM) is essential to ensuring the security and compliance of cloud environments. In cloud computing, the potential for security misconfigurations is significantly high due to mismanagement of permissions, gaps in network configurations, and various other vulnerabilities. Cloud Security Posture Management addresses these challenges by continuously monitoring and assessing cloud workloads to […]

Detecting and responding to Phobos ransomware using Wazuh

Blog / Engineering / Detecting and responding to Phobos ransomware using Wazuh

Phobos ransomware has become a growing concern due to its tactics in targeting state and territorial governments. The ransomware group compromises Windows endpoints using phishing as the primary method to gain initial entry, deploying covert payloads such as SmokeLoader and Cobalt Strike. Also, attackers exploit vulnerable networks by scanning and brute-forcing open Remote Desktop Protocol […]

CHAVECLOAK malware detection and response with Wazuh

Blog / Engineering / CHAVECLOAK malware detection and response with Wazuh

CHAVECLOAK malware is a Windows-based banking trojan that targets South American financial sector individuals to steal sensitive financial information. The malware is distributed through phishing emails with embedded malicious PDF attachments. CHAVECLOAK blocks user device screens, logs keystrokes, and shows fake pop-up windows. The malware monitors the victim’s endpoint and becomes active when it detects […]

No results for 'Adedamola Okelola'

Please make sure that all words are spelled correctly.