Submitting the form

All results for 'Eva Lopez'

Showing 12 of 49 results

How to configure Rsyslog client to send events to Wazuh

Blog / Engineering / How to configure Rsyslog client to send events to Wazuh

Rsyslog is a high-performance, versatile log processing system commonly used in UNIX and Linux environments. It is responsible for handling log messages generated by various system components and applications. It...

Integrating Amazon Macie in Wazuh

Blog / Engineering / Integrating Amazon Macie in Wazuh

Amazon offers many tools to monitor the status of its services. A good example is Amazon Macie, aimed at the surveillance of stored data. This is a resource of enormous...

Threat Hunting

Use cases / Threat Hunting

...threat hunters to evaluate security data efficiently, streamlining the process of identifying possible threats. Wazuh also includes an integrated reporting engine for generating customized reports. See our Threat Hunting documentation for...

Posture Management

Use cases / Posture Management

Cloud security posture management (CSPM) involves evaluating, enhancing, and maintaining an organization’s cloud security posture. It helps secure workloads in cloud environments by identifying security risks and ensuring compliance with...

Detecting Metasploit attacks

Blog / Engineering / Detecting Metasploit attacks

...suspicious processes: root@DC-1:/# ps -eo user,pid,cmd | grep www-data www-data 4428 sh -c php -r 'eval(base64_decode(Lyo8P3B));' www-data 4429 php -r eval(base64_decode(Lyo8P3B)); Also, we can find an open connection for the...

Adversary emulation on AWS with Stratus Red Team and Wazuh

Blog / Engineering / Adversary emulation on AWS with Stratus Red Team and Wazuh

...# ./stratus warmup aws.defense-evasion.cloudtrail-event-selectors # ./stratus detonate aws.defense-evasion.cloudtrail-event-selectors Cleanup the infrastructure At the end of the emulation, use the following command to destroy all the infrastructure created: $ ./stratus cleanup...

Ensuring NIS2 compliance with Wazuh

Blog / Engineering / Ensuring NIS2 compliance with Wazuh

...assessments are continuously validated. Evaluation of security measures effectiveness: Wazuh generates detailed reports on configuration compliance, allowing organizations to regularly evaluate the effectiveness of their security measures. By identifying misconfigurations,...

Using Wazuh to detect Raspberry Robin worms

Blog / Engineering / Using Wazuh to detect Raspberry Robin worms

Raspberry Robin is an evasive Windows worm that spreads using removable drives. After infecting a system, it uses the Windows msiexec.exe utility to download its payload hosted on compromised QNAP...

Detecting Lockbit 3.0 ransomware with Wazuh

Blog / Engineering / Detecting Lockbit 3.0 ransomware with Wazuh

...been in existence for three years, and during this period it has been upgraded twice to include new forms of infection and evasion techniques. Lockbit 3.0 is the latest version,...

Achieving Proactive Defense

Case studies / Achieving Proactive Defense

...different sources. After evaluating several proofs of concept, they selected Wazuh based on critical factors: Effective Ransomware Detection: Wazuh uniquely detected ransomware that had evaded detection during previous proof of...

No results for 'Eva Lopez'

Please make sure that all words are spelled correctly.